<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[Blog - Xen Project]]></title><description><![CDATA[Bringing the Power of Virtualization Everywhere]]></description><link>https://xenproject.org/blog/</link><image><url>https://xenproject.org/blog/favicon.png</url><title>Blog - Xen Project</title><link>https://xenproject.org/blog/</link></image><generator>Ghost 5.79</generator><lastBuildDate>Thu, 09 Apr 2026 07:10:17 GMT</lastBuildDate><atom:link href="https://xenproject.org/blog/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Xen at FOSDEM: Real-World Conversations About Xen and KVM]]></title><description><![CDATA[<p>We just wrapped up a weekend at FOSDEM 2026 where Xen and XCP-ng both had dedicated booths. This was my first time at FOSDEM and the legend lived up to the hype.</p><p>It was an insightful weekend full of interesting folks who were genuinely interested in the Xen Project. Everything</p>]]></description><link>https://xenproject.org/blog/xen-at-fosdem-real-world-conversations-about-xen-and-kvm/</link><guid isPermaLink="false">6980df70c6590207ae18ba6d</guid><category><![CDATA[2026]]></category><category><![CDATA[FOSDEM]]></category><category><![CDATA[KVM]]></category><dc:creator><![CDATA[Cody Zuschlag]]></dc:creator><pubDate>Wed, 04 Feb 2026 14:00:57 GMT</pubDate><media:content url="https://xenproject.org/blog/content/images/2026/02/IMG_4128--1-.jpeg" medium="image"/><content:encoded><![CDATA[<img src="https://xenproject.org/blog/content/images/2026/02/IMG_4128--1-.jpeg" alt="Xen at FOSDEM: Real-World Conversations About Xen and KVM"><p>We just wrapped up a weekend at FOSDEM 2026 where Xen and XCP-ng both had dedicated booths. This was my first time at FOSDEM and the legend lived up to the hype.</p><p>It was an insightful weekend full of interesting folks who were genuinely interested in the Xen Project. Everything from folks who used Xen 20 years ago, folks who know Xen of today, and folks who had limited insight into why hypervisors are important.</p><p>By far, the most common question I received was, &#x201C;How is Xen different from KVM or Proxmox?&#x201D; Those are actually two separate questions, and they are worth taking one at a time.</p><p>First, Proxmox (Proxmox VE) is a virtualization solution built on top of the KVM hypervisor. Xen, on the other hand, is a hypervisor. To make a fair comparison with Proxmox, you really want to compare it with a Xen-based virtualization solution, such as XCP-ng. Under the hood, what we are really comparing is KVM versus Xen.</p><p>To compare these two hypervisor technologies, it helps to understand the different types of hypervisors: Type 1 and Type 2. A Type 2 hypervisor runs on top of a host operating system. Common examples include VirtualBox and Parallels.</p><p>In contrast, a Type 1 hypervisor runs directly on the hardware, with no host operating system sitting between the hypervisor and the hardware. KVM is implemented as a set of kernel modules and runs in kernel space. For that reason, it is often described as a Type 1 hypervisor. At the same time, KVM depends on the full Linux kernel for scheduling, memory management, drivers, and device support, along with everything that comes with that.</p><p>Xen is what we often refer to as a &#x201C;true&#x201D; Type 1 hypervisor. The Xen hypervisor boots directly on the hardware and does not depend on the Linux kernel. Linux is commonly used in a privileged control domain, known as Dom0, but it is not required for Xen itself to function.</p><p>At a high level, the architectural difference looks like this:</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2026/02/Hypervisor-Hierarchy---types-part-1-1080.png" class="kg-image" alt="Xen at FOSDEM: Real-World Conversations About Xen and KVM" loading="lazy" width="1920" height="1080" srcset="https://xenproject.org/blog/content/images/size/w600/2026/02/Hypervisor-Hierarchy---types-part-1-1080.png 600w, https://xenproject.org/blog/content/images/size/w1000/2026/02/Hypervisor-Hierarchy---types-part-1-1080.png 1000w, https://xenproject.org/blog/content/images/size/w1600/2026/02/Hypervisor-Hierarchy---types-part-1-1080.png 1600w, https://xenproject.org/blog/content/images/2026/02/Hypervisor-Hierarchy---types-part-1-1080.png 1920w" sizes="(min-width: 720px) 720px"><figcaption><i><em class="italic" style="white-space: pre-wrap;">Xen and KVM architecture at a high level. Xen runs as a small, dedicated hypervisor directly on the hardware, with an optional control domain (Dom0). KVM operates as part of the Linux kernel and relies on the full Linux stack and user space components to manage virtual machines.</em></i></figcaption></figure><p>What does this mean in practice? Xen offers a very small, purpose-built hypervisor layer. In some workloads, this can translate into more predictable performance and stronger isolation, because the hypervisor is not competing with a general-purpose operating system kernel at the same layer. Xen also has fewer lines of code in the hypervisor itself, which reduces the attack surface and the amount of code that needs to be audited and maintained. There are also fewer dependencies to update when updating the hypervisor.</p><p>Another common question I heard was, &#x201C;What about scheduling processes? Xen must be missing the Linux kernel scheduler.&#x201D; That&#x2019;s true. Xen does not rely on the Linux scheduler. Instead, Xen has its own CPU schedulers that are specifically designed for virtual machines.</p><p>At a high level, Xen distinguishes between physical CPUs (pCPUs), which are the actual cores on the machine, and virtual CPUs (vCPUs), which are presented to guest VMs. Xen can dedicate physical CPUs to specific VMs using CPU pinning, ensuring that a VM runs only on a defined set of cores. Xen can also expose vCPUs that are scheduled onto shared physical CPUs, allowing multiple VMs to share CPU resources in a controlled way.</p><p>Xen supports several scheduling algorithms depending on the use case. These include general-purpose schedulers such as Credit and Credit2, which aim to fairly share CPU time across VMs, as well as real-time schedulers like RTDS for latency-sensitive and deterministic workloads. This flexibility allows operators to choose between throughput, fairness, or predictability depending on their needs.</p><p>If we look at the embedded space, this is where Xen&#x2019;s architecture really shines, though it is not limited to embedded environments. In safety-critical applications, such as automotive systems, the smaller Xen hypervisor codebase means fewer lines of code that need to be audited and certified. Members of the Xen Project are actively working toward safety certification goals. By comparison, certifying KVM together with the full Linux kernel is a much larger undertaking and may not always be worth the investment. Today, the community&#x2019;s expectation is that Xen can achieve safety certification for certain automotive use cases on a timeline around 2026 or 2027. Fewer lines of code also mean faster certification cycles and simpler long-term maintenance, including security updates.</p><p>At the booth, I also had a small proof of concept running to make this more tangible. The demo showed an automotive-oriented workload running on a consumer embedded device, using Xen to isolate and manage multiple domains. While still a work in progress, it sparked a lot of good conversations about how Xen can be used in constrained environments with mixed-criticality and as a foundation for safety-critical systems.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2026/02/fosdem26-demo.jpeg" class="kg-image" alt="Xen at FOSDEM: Real-World Conversations About Xen and KVM" loading="lazy" width="2000" height="1500" srcset="https://xenproject.org/blog/content/images/size/w600/2026/02/fosdem26-demo.jpeg 600w, https://xenproject.org/blog/content/images/size/w1000/2026/02/fosdem26-demo.jpeg 1000w, https://xenproject.org/blog/content/images/size/w1600/2026/02/fosdem26-demo.jpeg 1600w, https://xenproject.org/blog/content/images/2026/02/fosdem26-demo.jpeg 2048w" sizes="(min-width: 720px) 720px"><figcaption><span style="white-space: pre-wrap;">Automotive-oriented Xen proof of concept running on a consumer embedded device at FOSDEM 2026.</span></figcaption></figure><p>Overall, Xen has a clean, built-for-purpose architecture for virtualization. The Xen hypervisor itself does not depend on the Linux kernel, and that architectural choice is what sets Xen apart from Proxmox and other KVM-based solutions. You get a purpose-built hypervisor designed from the ground up for isolation, configurability, and security, with fewer lines of code and fewer moving parts at the lowest level.</p><p>Come and see what we are working on at the Xen Project. We&#x2019;re a Linux Foundation project with open governance, supported by a broad set of members and contributors from across industry and academia. Whether you are running Xen today, evaluating virtualization technologies, or exploring safety-critical and embedded use cases, we&#x2019;d love to hear from you. Join the conversation, follow the project&#x2019;s evolution, and help shape where Xen goes next.</p><h3 id="further-reading-and-links">Further reading and links:</h3><ul><li>Additional perspectives from the Xen ecosystem at FOSDEM 2026:<ul><li><a href="https://vates.tech/blog/fosdem-2026/?ref=xenproject.org">Vates at FOSDEM 2026</a></li><li><a href="https://xcp-ng.org/forum/topic/11778/fosdem-2026?ref=xenproject.org">XCP-ng community discussion from FOSDEM 2026</a></li></ul></li><li><a href="https://xcp-ng.org/?ref=xenproject.org">XCP-ng project</a></li><li><a href="https://xenproject.org/resources/matrix/?ref=xenproject.org" rel="noreferrer">Xen Project Matrix Channels (come chat with us)</a></li><li><a href="https://wiki.xenproject.org/wiki/Credit_Scheduler?ref=xenproject.org" rel="noreferrer">Xen CPU scheduling (Credit scheduler)</a></li><li><a href="https://wiki.xenproject.org/wiki/RTDS_Scheduler?ref=xenproject.org" rel="noreferrer">Xen RTDS scheduler</a></li><li><a href="https://www.kernel.org/doc/html/latest/virt/kvm/index.html?ref=xenproject.org" rel="noreferrer">KVM in the Linux kernel</a></li><li><a href="https://pve.proxmox.com/wiki/Main_Page?ref=xenproject.org" rel="noreferrer">Proxmox VE documentation</a></li></ul>]]></content:encoded></item><item><title><![CDATA[OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation]]></title><description><![CDATA[<p>The Xen Project is back from Open Source Summit Japan and Automotive Linux Summit 2025. This year&#x2019;s event felt like a true watershed moment for the automotive industry and for open source. Across talks, demos, and hallway conversations, one thing was clear: open source is now a foundational</p>]]></description><link>https://xenproject.org/blog/oss-japan-2025-a-breakthrough-year-for-open-automotive-innovation/</link><guid isPermaLink="false">693fd755c6590207ae18ba04</guid><dc:creator><![CDATA[Cody Zuschlag]]></dc:creator><pubDate>Tue, 16 Dec 2025 11:35:48 GMT</pubDate><media:content url="https://xenproject.org/blog/content/images/2025/12/Dom0less-and-Deterministic--OSSJ26-.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://xenproject.org/blog/content/images/2025/12/Dom0less-and-Deterministic--OSSJ26-.jpg" alt="OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation"><p>The Xen Project is back from Open Source Summit Japan and Automotive Linux Summit 2025. This year&#x2019;s event felt like a true watershed moment for the automotive industry and for open source. Across talks, demos, and hallway conversations, one thing was clear: open source is now a foundational pillar for the future of software defined vehicles.</p><p>The conference halls were packed with engineers from many different organizations, all collaborating toward a shared goal: powering the next generation of vehicles in the open. For the Xen Project, this was a particularly special moment. Our membership spans the full spectrum of the industry, from silicon vendors like Arm and AMD, to automotive OEMs, to companies building large-scale server and cloud infrastructure. Our members brought bold ideas, real hardware demos, and a consistent message: open source in automotive is no longer experimental. It is becoming the default implementation.</p><p>Everywhere on the show floor, Xen was quietly doing its job behind the scenes. That same hypervisor is also trusted every day in data centers and cloud environments, which is a reminder of how versatile the Xen architecture really is. It appeared again and again as the hidden layer enabling mixed criticality workloads, cockpit virtualization, and full software defined vehicle stacks. The momentum this year was undeniable.</p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F3ED;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Industry alignment matters</strong></b><br>The Xen Project brings together silicon vendors like Arm and AMD, automotive OEMs, and companies building large-scale server and cloud platforms. This cross-industry collaboration is what makes Xen a strong foundation for long-lived automotive systems.</div></div><h2 id="software-defined-vehicles-an-automotive-revolution">Software Defined Vehicles: an Automotive Revolution</h2><p>As Dan Cauchy explained clearly in his opening keynote, and as nearly every session reinforced afterward, a fundamental shift is underway in how vehicles are designed. Historically, cars were built hardware first. The hardware defined the vehicle, and software was written specifically to fit that hardware.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2025/12/IMG_3368--1-.jpeg" class="kg-image" alt="OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation" loading="lazy" width="1280" height="1231" srcset="https://xenproject.org/blog/content/images/size/w600/2025/12/IMG_3368--1-.jpeg 600w, https://xenproject.org/blog/content/images/size/w1000/2025/12/IMG_3368--1-.jpeg 1000w, https://xenproject.org/blog/content/images/2025/12/IMG_3368--1-.jpeg 1280w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Dan Cauchy opening OSS Japan 2025, setting the stage for software-defined vehicles and open automotive collaboration.</strong></b></figcaption></figure><p>That model is now being inverted. Software is becoming the defining element of the vehicle experience, while hardware is increasingly abstracted beneath it. This is a familiar pattern. We have already lived through the same transformation in the mobile phone industry, where features are now driven by operating system versions rather than by individual hardware models.</p><p>The automotive industry is following the same path. Software stacks are no longer tightly bound to a single model or trim level. Updates are no longer rare events tied to maintenance cycles. Instead, manufacturers are moving toward unified software platforms that span multiple vehicles, generations, and hardware configurations.</p><p>In the near future, a manufacturer&#x2019;s software stack will run across a wide range of models and SoCs. The software will define the experience, while hardware diversity is handled through abstraction layers. Throughout the summit, we saw concrete progress toward this vision.</p><p>Renesas showcased the powerful SoCs needed to support mixed criticality workloads. Honda brought these pieces together by showing how open source software stacks can be deployed in real vehicles. Along the way, complementary work from companies like Panasonic on VirtIO and cockpit abstraction illustrated how shared standards enable this ecosystem to scale.</p><h2 id="honda-and-renesas-leading-the-charge-toward-open-sdvs">Honda and Renesas: Leading the Charge Toward Open SDVs</h2><p>Two Xen Project board members stood out from the very beginning of the event: Honda and Renesas. Alongside them, other major automotive players, including Ford, are members of the Xen Project, reinforcing that this work is not theoretical but already aligned with real industry adoption. Their talks, booth demos, and architectural choices showed exactly how open source can accelerate automotive innovation.</p><h3 id="honda-building-in-house-software-with-open-source-at-the-core">Honda: building in house software with open source at the core</h3><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2025/12/IMG_3437.jpeg" class="kg-image" alt="OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation" loading="lazy" width="1280" height="1016" srcset="https://xenproject.org/blog/content/images/size/w600/2025/12/IMG_3437.jpeg 600w, https://xenproject.org/blog/content/images/size/w1000/2025/12/IMG_3437.jpeg 1000w, https://xenproject.org/blog/content/images/2025/12/IMG_3437.jpeg 1280w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Yuichi Kusakabe presenting Honda&#x2019;s in-house IVI software strategy and open source journey at OSS Japan 2025.</strong></b></figcaption></figure><p>Yuichi Kusakabe gave several compelling talks describing how Honda grew an in house IVI software team from just two people into a modern organization fully committed to open source. The story was both honest and inspiring. Honda adopted AOSP, embraced SPDX and OpenChain for compliance, built strong internal processes, and delivered production quality IVI software on open foundations.</p><p>On the show floor, Honda featured multiple demos running on Renesas hardware with Xen as the hypervisor. These systems followed the AGL reference architecture that appeared in nearly every presentation throughout the event. Seeing real cockpit consoles running on Xen was a powerful confirmation of the direction the industry is taking.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2025/12/IMG_3401.jpeg" class="kg-image" alt="OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation" loading="lazy" width="1280" height="1076" srcset="https://xenproject.org/blog/content/images/size/w600/2025/12/IMG_3401.jpeg 600w, https://xenproject.org/blog/content/images/size/w1000/2025/12/IMG_3401.jpeg 1000w, https://xenproject.org/blog/content/images/2025/12/IMG_3401.jpeg 1280w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Honda demo hardware running a software-defined vehicle stack on Renesas silicon with Xen as the hypervisor at OSS Japan 2025.</strong></b></figcaption></figure><h3 id="renesas-turning-sdv-concepts-into-real-hardware">Renesas: turning SDV concepts into real hardware</h3><p>Renesas delivered one of the strongest technical showings at OSSJ. Their sessions highlighted a unified development environment that bridges Linux, Zephyr, Yocto, and Xen on next generation R-Car SoCs. At their booths, engineers could see real hardware running real mixed criticality workloads side by side, all orchestrated by Xen.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2025/12/IMG_3468.jpeg" class="kg-image" alt="OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation" loading="lazy" width="1280" height="1052" srcset="https://xenproject.org/blog/content/images/size/w600/2025/12/IMG_3468.jpeg 600w, https://xenproject.org/blog/content/images/size/w1000/2025/12/IMG_3468.jpeg 1000w, https://xenproject.org/blog/content/images/2025/12/IMG_3468.jpeg 1280w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Harunobu Kurokawa presenting Renesas&#x2019;s open source SDV platform and reference hardware at OSS Japan 2025.</strong></b></figcaption></figure><p>Renesas also presented a heterogeneous compute platform combining Cortex A76 application cores, Cortex R52 real time cores, and an onboard AI accelerator. This reflects where automotive systems are headed. Workloads are increasingly diverse. Real time constraints coexist with high level applications and AI inference. Xen provides the isolation and flexibility needed to bring these elements together on a single SoC.</p><p>What stood out most was the confidence Renesas showed in demonstrating Xen on safety oriented hardware. Vendors do not make these demonstrations lightly. Renesas is now publicly working toward safety certification for Xen, aligning with the safety milestones discussed in my talk. One year after AMD achieved safety concept approval, Renesas has clearly joined the same path forward.</p><h2 id="panasonic-advancing-virtio-and-cockpit-decoupling">Panasonic: advancing VirtIO and cockpit decoupling</h2><p>Panasonic delivered several strong engineering sessions that complemented the broader SDV story at the conference. Their updates from the SDV Expert Group and their work on VirtIO testing highlighted steady progress toward better virtualization quality and interoperability.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2025/12/IMG_3381.jpeg" class="kg-image" alt="OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation" loading="lazy" width="1280" height="1090" srcset="https://xenproject.org/blog/content/images/size/w600/2025/12/IMG_3381.jpeg 600w, https://xenproject.org/blog/content/images/size/w1000/2025/12/IMG_3381.jpeg 1000w, https://xenproject.org/blog/content/images/2025/12/IMG_3381.jpeg 1280w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Jerry Zhao presenting Panasonic&#x2019;s work on VirtIO as part of the AGL Software Defined Vehicle architecture at OSS Japan 2025.</strong></b></figcaption></figure><p>The Unified HMI v2.0 presentation was a good illustration of where cockpit architectures are heading. By decoupling displays from the applications that render them, and by supporting multiple writers and multiple screens across AGL and Android, Panasonic showed how virtualization can simplify complex UI pipelines.</p><p>While Panasonic is not currently a Xen Project member, their work clearly contributes to the wider ecosystem that many of our members are building upon. These efforts reinforce the importance of open interfaces and shared standards in modern automotive stacks, and they align naturally with Xen-based SDV architectures.</p><h2 id="a-shared-architecture-emerges-agl-sodev-takes-center-stage">A Shared Architecture Emerges: AGL SoDeV Takes Center Stage</h2><p>One of Xen&#x2019;s unique strengths is that the same core hypervisor technology is used across embedded, automotive, and server environments. Members such as Citrix (XenServer) and Vates build Xen-based solutions for large-scale server and cloud deployments, while automotive members apply Xen to safety critical and embedded systems. This shared foundation allows improvements in security, performance, and tooling to benefit all deployment models.</p><p>At the heart of nearly every SDV discussion was the same core stack: AGL on top of Linux, Xen providing isolation and virtualization, and Zephyr acting as the real time operating system for safety and control oriented workloads. This combination appeared consistently across talks, demos, and reference diagrams.</p><p>One theme appeared again and again throughout the summit. Nearly every presentation included the same AGL Software Defined Vehicle architecture diagram. At its core were VirtIO, Yocto, Zephyr, and Xen as the hypervisor.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2025/12/IMG_3377.jpeg" class="kg-image" alt="OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation" loading="lazy" width="1280" height="1142" srcset="https://xenproject.org/blog/content/images/size/w600/2025/12/IMG_3377.jpeg 600w, https://xenproject.org/blog/content/images/size/w1000/2025/12/IMG_3377.jpeg 1000w, https://xenproject.org/blog/content/images/2025/12/IMG_3377.jpeg 1280w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Walt Miner presenting the AGL Software Defined Vehicle reference architecture at OSS Japan 2025.</strong></b></figcaption></figure><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F9E9;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">A clear pattern emerged at OSSJ</strong></b><br>Across vendors and presentations, the same SDV stack kept appearing: AGL, Xen, Zephyr, VirtIO, and Yocto. This level of alignment is a strong sign that the industry is converging on shared, open foundations.</div></div><p>This level of alignment across vendors is a strong sign of maturity. When engineers agree on foundational building blocks, innovation accelerates. For SDVs, mixed criticality workloads are unavoidable. Infotainment, telematics, OTA services, sensor processing, and safety functions must coexist on the same SoC. This demands strong isolation and predictable performance, both of which Xen provides. Alongside Xen, Zephyr has clearly emerged as the go to real time operating system within this architecture, with a roadmap toward safety certification and growing adoption across automotive platforms.</p><p>Some OEMs, including Toyota, still rely heavily on QNX today. I had several thoughtful conversations with Toyota engineers who were curious about open alternatives. When organizations look for openness, strong performance, and a roadmap they can influence, Xen becomes increasingly attractive. While some benchmark data remains private, it is clear that modern open source hypervisors can match or exceed proprietary solutions in critical areas.</p><h2 id="my-talk-dom0less-xen-for-deterministic-automotive-systems">My Talk: Dom0less Xen for Deterministic Automotive Systems</h2><p>An important part of this discussion is how Xen and Zephyr work together in practice.</p><p>I was glad to share how Xen can be configured in dom0less mode for embedded automotive use cases. The audience was highly engaged, particularly around deterministic startup behavior and the benefits of a smaller trusted computing base.</p><div class="kg-card kg-callout-card kg-callout-card-yellow"><div class="kg-callout-emoji">&#x1F4FD;&#xFE0F;</div><div class="kg-callout-text">If you&#x2019;d like to dive deeper, the slides from this talk are available here: <a href="https://static.sched.com/hosted_files/ossjapan2025/dd/Dom0less%20and%20Deterministic%20%5BOSSJ26%5D.pdf?_gl=1*1sn515u*_gcl_au*NjcwOTA5OTAyLjE3NjA0MjQwMzI.*FPAU*NjcwOTA5OTAyLjE3NjA0MjQwMzI.&amp;ref=xenproject.org" rel="noreferrer"><b><strong style="white-space: pre-wrap;">Dom0less and Deterministic: Building Safer Automotive Systems with Xen (PDF)</strong></b></a><br><br><i><em class="italic" style="white-space: pre-wrap;">A recording of this session, along with other OSS Japan talks, will be added once they are published.</em></i></div></div><p>The presentation covered how Xen can run in dom0less mode, and how Zephyr fits naturally into this model as a lightweight, deterministic operating system:</p><ul><li>Predictable, parallel domain boot</li><li>Bounded interrupt latency</li><li>Clear isolation for safety critical systems</li><li>A Raspberry Pi 5 proof of concept running Zephyr and Linux in multiple domains</li><li>Early and natural alignment with the AGL SDV architecture</li></ul><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x2699;&#xFE0F;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Xen and Zephyr are better together</strong></b><br>Xen provides strong isolation and determinism, while Zephyr delivers a lightweight, real-time OS with a clear path toward safety certification. Together, they form a practical foundation for mixed-criticality automotive systems.</div></div><p>These concepts illustrated how dom0less Xen supports reproducible, deterministic system behavior that maps well to automotive safety requirements. Zephyr makes an excellent fit for a very lightweight dom0 when needed, or for tightly scoped system domains that handle specific responsibilities during normal vehicle operation, such as diagnostics, monitoring, or controlled domain creation. After the session, several engineers reached out to discuss using dom0less Xen for cockpit systems, ECUs, robotics platforms, and industrial controllers. The level of interest was higher than I expected.</p><h2 id="xen-421-modernization-and-security-for-the-next-generation">Xen 4.21: Modernization and Security for the Next Generation</h2><p>These architectural advances are supported by strong upstream progress in Xen itself.</p><p>We also celebrated the release of Xen 4.21 in November 2025. This release represents a major step forward in modernization and security hardening.</p><p>Key improvements include:</p><ul><li>Arm security hardening and improved determinism</li><li>More predictable interrupt latency</li><li>Memory management refinements</li><li>Broader CI coverage on Arm and x86</li><li>Continued modernization of the codebase</li><li>Early support for RISC V</li></ul><p>These improvements strengthen Xen for real time and safety aligned workloads. As SDVs scale across architectures, having a hypervisor that works naturally on Arm, x86, and emerging RISC V platforms is a significant advantage. This flexibility is essential for OEMs building long lived platforms that must evolve over many years.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2025/12/IMG_3407.jpeg" class="kg-image" alt="OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation" loading="lazy" width="1000" height="1280" srcset="https://xenproject.org/blog/content/images/size/w600/2025/12/IMG_3407.jpeg 600w, https://xenproject.org/blog/content/images/2025/12/IMG_3407.jpeg 1000w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Outside the Open Source Summit Japan 2025 venue in Tokyo.</strong></b></figcaption></figure><h2 id="safety-certification-a-community-driven-path-forward">Safety Certification: a Community Driven Path Forward</h2><p>Safety is the next major frontier for open hypervisors, and Xen is making steady progress.</p><ul><li>AMD achieved safety concept approval in 2024</li><li>Renesas is actively working toward safety certification in 2025</li><li>The Xen Project is building a community driven pilot for Safety Certification Ready</li></ul><p>This work includes open safety artifacts, clear documentation, public CI, and reproducible system behavior. Zephyr follows a similar path, making the Xen and Zephyr combination particularly compelling for safety oriented SDV designs. As companies see a visible and transparent path toward certification, the case for using open source in safety critical environments becomes much stronger.</p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F6E1;&#xFE0F;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Safety work is already underway</strong></b><br>With AMD achieving safety concept approval and Renesas publicly working toward certification, the Xen community is building a transparent, collaborative path toward safety-ready open systems.</div></div><h2 id="why-automotive-companies-are-turning-to-xen">Why Automotive Companies Are Turning to Xen</h2><p>This shift toward SDVs also enables another critical capability: over the air updates.</p><p>By the end of the week, the message was clear:</p><ul><li>Xen is already part of the AGL reference architecture</li><li>Major vendors deploy Xen on real automotive hardware</li><li>Performance is competitive with proprietary hypervisors</li><li>Xen offers transparency, flexibility, and no licensing fees</li><li>Companies can directly influence the roadmap through contributions</li><li>The safety story continues to strengthen</li></ul><p>This combination of openness, performance, and industry alignment is exactly what engineers and decision makers are looking for. SDV architectures built on Xen, Zephyr, and AGL make it possible to deliver frequent OTA updates that improve functionality, fix issues, and strengthen security over the lifetime of a vehicle. This is a dramatic change from the once per year, or less, update cycles that drivers are used to today.</p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F504;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">From yearly updates to continuous improvement</strong></b><br>Software-defined vehicles make frequent OTA updates possible. This unlocks new features, improves security, and extends vehicle lifetimes far beyond the traditional once-per-year update cycle.</div></div><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xenproject.org/blog/content/images/2025/12/IMG_3514.jpeg" class="kg-image" alt="OSS Japan 2025: A Breakthrough Year for Open Automotive Innovation" loading="lazy" width="1185" height="1280" srcset="https://xenproject.org/blog/content/images/size/w600/2025/12/IMG_3514.jpeg 600w, https://xenproject.org/blog/content/images/size/w1000/2025/12/IMG_3514.jpeg 1000w, https://xenproject.org/blog/content/images/2025/12/IMG_3514.jpeg 1185w" sizes="(min-width: 720px) 720px"><figcaption><b><strong style="white-space: pre-wrap;">Harunobu Kurokawa (Renesas) and Cody Zuschlag (Xen Project) at OSS Japan 2025.</strong></b></figcaption></figure><h2 id="closing-thoughts-and-an-invitation">Closing Thoughts and an Invitation</h2><p>It would also be incomplete not to acknowledge the work of EPAM, another Xen Project member. While not physically present at the conference, EPAM&#x2019;s engineering contributions were very much visible behind the scenes.</p><p>I left OSS Japan feeling proud of the Xen community and grateful for the leadership shown by Honda, Renesas, Panasonic, and many others shaping the future of automotive software. The demos were impressive, the hallway conversations were energizing, and the collaboration across projects felt stronger than ever. My own Raspberry Pi demo was built directly on EPAM&#x2019;s ongoing work to create real world SDV architectures across multiple platforms, and it is a great example of how member contributions extend far beyond the show floor.</p><p>If your organization is exploring software defined vehicles, virtualization, or open automotive platforms, now is an excellent time to get involved. The Xen Project community is open, supportive, and excited to collaborate.</p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F91D;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Join the conversation</strong></b><br>If your organization is exploring software-defined vehicles, virtualization, or open automotive platforms, the Xen Project community is open, collaborative, and ready to work together.</div></div><p>Feel free to reach out, and stay tuned as our safety work continues to move forward.</p>]]></content:encoded></item><item><title><![CDATA[🛠️ Engineering Trust: How Xen’s Open CI Powers Global, Hardware-Level Testing]]></title><description><![CDATA[<p>In safety-critical industries like automotive and industrial systems, trust is non-negotiable. When building software that controls critical hardware, like braking systems or factory automation, you need confidence. The software must behave exactly as intended. Every time. On the actual device.</p><p>That&apos;s why the Xen Project is investing in</p>]]></description><link>https://xenproject.org/blog/engineering-trust-how-xens-open-ci-powers-global-hardware-level-testing/</link><guid isPermaLink="false">686d819a3430d30328a5761d</guid><category><![CDATA[2025]]></category><category><![CDATA[embedded]]></category><category><![CDATA[hardware]]></category><category><![CDATA[open source]]></category><dc:creator><![CDATA[Cody Zuschlag]]></dc:creator><pubDate>Thu, 10 Jul 2025 14:11:20 GMT</pubDate><media:content url="https://xenproject.org/blog/content/images/2025/07/panda-desk-hw.webp" medium="image"/><content:encoded><![CDATA[<img src="https://xenproject.org/blog/content/images/2025/07/panda-desk-hw.webp" alt="&#x1F6E0;&#xFE0F; Engineering Trust: How Xen&#x2019;s Open CI Powers Global, Hardware-Level Testing"><p>In safety-critical industries like automotive and industrial systems, trust is non-negotiable. When building software that controls critical hardware, like braking systems or factory automation, you need confidence. The software must behave exactly as intended. Every time. On the actual device.</p><p>That&apos;s why the Xen Project is investing in a new kind of continuous integration (CI). A CI that is open, transparent, and global.</p><p></p><p></p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F9E0;</div><div class="kg-callout-text">The Xen Project is hosted by the <b><strong style="white-space: pre-wrap;">Linux Foundation</strong></b>, ensuring the project remains open, protected, and community-governed.</div></div><p></p><p></p><p>This lets adopters of one of the world&#x2019;s most secure and stable open-source hypervisors, <strong>Xen</strong>, have confidence in the software that controls their hardware. Xen is laying the foundation for the next generation of automotive and industrial systems. Systems that demand high core counts per watt and per square centimeter.</p><h2 id="%F0%9F%9A%80-a-ci-pipeline-that-meets-you-where-you-are">&#x1F680; A CI Pipeline That Meets You Where You Are</h2><p>Most open source CI pipelines run on generic cloud VMs. These are great for catching bugs and enforcing code quality. But they rarely replicate real-world hardware conditions.</p><p>That doesn&#x2019;t cut it when you&apos;re working with diverse hardware architectures or building for mission-critical deployments.</p><p></p><p></p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x2705;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Xen&#x2019;s CI is different.</strong></b><br><br>It supports real bare-metal testing across a globally distributed fleet of devices.</div></div><p></p><p></p><p>Contributors can see, in real time, how their changes perform on:</p><ul><li>Arm boards</li><li>x86 servers</li><li>Embedded platforms</li><li>...and more</li></ul><p>And this is only the beginning.</p><h2 id="%F0%9F%94%A7-bring-your-own-hardware">&#x1F527; Bring Your Own Hardware</h2><p>Partners can contribute their <strong>own on-site test hardware</strong>, like embedded boards, laptops, and servers, to the CI network. All by following some straightforward setup guidelines.  This allows consumers and integrators to run the Xen test jobs and confirm that Xen runs correctly on their specific devices. In this way, everyone benefits form the larger Xen Project infrastructure.</p><p></p><p></p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F510;</div><div class="kg-callout-text">This means companies working with proprietary or pre-release silicon can test changes securely, behind their own firewall, while still benefiting from community collaboration.</div></div><p></p><p></p><p>With modern System-on-a-Chip (SoC) designs, development cycles require <strong>fast validation</strong> across the full software stack, hypervisor included.</p><h2 id="%F0%9F%9A%97-why-this-matters-for-automotive-and-embedded-innovators">&#x1F697; Why This Matters for Automotive and Embedded Innovators</h2><p>Companies like <strong>Honda</strong>, <strong>Ford</strong>, <strong>Renesas</strong>, <strong>Arm</strong>, and <strong>AMD</strong> are already on the Xen Project Advisory Board. They know that long-term success in embedded systems depends on more than just good code. It requires a transparent, reproducible, and community-driven process.</p><p>Xen&#x2019;s CI delivers:</p><ul><li>&#x2705; <strong>Hardware Assurance</strong>: Real testing on real devices, not just emulated environments.</li><li>&#x1F30D; <strong>Customization Without Isolation</strong>: Add test devices on-site, without giving up collaboration.</li><li>&#x1F9FE; <strong>Traceability</strong>: Every test is logged, traceable, and publicly viewable.</li><li>&#x1F4CA; <strong>Global Visibility</strong>: A <a href="https://xenproject.org/ci-status/?ref=xenproject.org">live CI status page</a> shows what&#x2019;s running, where, and how it&#x2019;s performing.</li><li>&#x23F1;&#xFE0F; <strong>Faster than the Lab</strong>: Say goodbye to the cost and delay of external test labs. CI results happen in minutes, not days.</li></ul><p></p><p></p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F449;</div><div class="kg-callout-text">Learn more on our <a href="https://xenproject.org/developers/ci-pipeline/?ref=xenproject.org">CI overview page</a></div></div><p></p><p></p><h2 id="%F0%9F%A4%9D-a-model-for-open-collaboration">&#x1F91D; A Model for Open Collaboration</h2><p>This isn&#x2019;t just a CI. It&apos;s a model for how <strong>open source communities and industry</strong> can work together.</p><p>By opening our infrastructure and inviting partners to participate directly in validation, we&#x2019;re proving that <strong>shared tooling can meet enterprise requirements. </strong>All without compromising security or intellectual property.</p><p>We believe this approach is the future of <strong>safety-critical open source</strong>.</p><h2 id="%F0%9F%A7%AD-join-the-mission">&#x1F9ED; Join the Mission</h2><p>Are you working on hardware that could benefit from secure, stable, and scalable virtualization?</p><p></p><p></p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F3AF;</div><div class="kg-callout-text">Join us as a voting member of the <b><strong style="white-space: pre-wrap;">Xen Project Advisory Board</strong></b>. Help shape the direction of Xen and power the next wave of innovation in embedded systems.</div></div><p></p><p></p><p>We&#x2019;re building something different.<br>Something open.<br>Something real.</p><p></p><p></p><hr><p></p><p></p><h2 id="learn-more-about-the-xen-ci">Learn more about the Xen CI</h2><ul><li><a href="https://xenproject.org/contribute/ci/?ref=xenproject.org" rel="noreferrer">Xen CI Description</a></li><li><a href="https://xenproject.org/contribute/ci/status/?ref=xenproject.org" rel="noreferrer">Live Xen CI Status</a></li></ul>]]></content:encoded></item><item><title><![CDATA[🛠️ Xen Summit 2025: Find Your Place in the Future of Virtualization]]></title><description><![CDATA[<p>The annual Xen Summit is right around the corner, and there has never been a more exciting time to be part of the Xen Project.</p><p>As enterprise and industrial needs shift and proprietary vendors rethink their licensing, the industry is ready for strong, open alternatives. Xen stands out not only</p>]]></description><link>https://xenproject.org/blog/xen-summit-2025-find-your-place-in-the-future-of-virtualization/</link><guid isPermaLink="false">685e8e543430d30328a575e4</guid><category><![CDATA[summit]]></category><category><![CDATA[tech conference]]></category><category><![CDATA[Xen Summit]]></category><category><![CDATA[XenSummit]]></category><dc:creator><![CDATA[Cody Zuschlag]]></dc:creator><pubDate>Fri, 27 Jun 2025 13:39:53 GMT</pubDate><media:content url="https://xenproject.org/blog/content/images/2025/06/xen-summit-panda-4.webp" medium="image"/><content:encoded><![CDATA[<img src="https://xenproject.org/blog/content/images/2025/06/xen-summit-panda-4.webp" alt="&#x1F6E0;&#xFE0F; Xen Summit 2025: Find Your Place in the Future of Virtualization"><p>The annual Xen Summit is right around the corner, and there has never been a more exciting time to be part of the Xen Project.</p><p>As enterprise and industrial needs shift and proprietary vendors rethink their licensing, the industry is ready for strong, open alternatives. Xen stands out not only as a reliable solution, but as a versatile, battle-tested, and community-driven hypervisor that&#x2019;s ready to meet the computing needs of the future.</p><p>Whether you&#x2019;re building for the cloud, the car, or the next wave of secure computing, Xen is like a Swiss army knife for virtualization: a trusted, adaptable tool powering real innovation across many industries.</p><h2 id="%F0%9F%94%84-one-hypervisor-so-many-uses"><strong>&#x1F504; One Hypervisor, So Many Uses</strong></h2><p>Xen isn&#x2019;t just growing in one area. It&#x2019;s powering innovation across four major domains:</p><ul><li>&#x1F697; <strong>Automotive and Safety-Critical Systems</strong> From software-defined vehicles to secure ECUs, Xen allows carmakers to consolidate hardware, reduce cost, and increase system isolation. It&#x2019;s a natural fit for safety-first design.</li><li>&#x1F3ED; <strong>Industrial and Embedded Use Cases</strong> In rugged, real-time, and space-constrained environments, Xen offers low-overhead virtualization that is efficient, stable, and scalable.</li><li>&#x1F5A5;&#xFE0F; <strong>Enterprise Servers and Cloud Data Centers</strong> Xen is built for high performance at scale. It helps multi-core systems deliver more compute per kilowatt and per square meter&#x2014;critical in today&#x2019;s data center environments. XCP-ng, a subproject of the Xen Project, is a drop-in replacement for that pesky and expensive proprietary virtualization platform.</li><li>&#x1F9D1;&#x200D;&#x1F4BB; <strong>End-User Virtualization and Desktop Security</strong> Xen is the foundation of security-focused systems like<a href="https://www.qubes-os.org/?ref=xenproject.org"> <u>Qubes OS</u></a>, where each app runs in its own virtual machine. It plays a key role in building compartmentalized, secure desktop environments.</li></ul><p>These are not just ideas or future goals. They&#x2019;re active, real-world use cases where Xen is already making a difference.</p><h2 id="%F0%9F%97%93%EF%B8%8F-what-to-expect-at-xen-summit"><strong>&#x1F5D3;&#xFE0F; What to Expect at Xen Summit</strong></h2><p>Hosted at <a href="https://www.xilinx.com/publications/about/Xilinx_Campus_Map_Directions.pdf?ref=xenproject.org" rel="noreferrer">AMD&#x2019;s (formerly Xilinx) San Jose campus</a>, <strong>Xen Summit 2025</strong> is the premier gathering for the Xen community. It brings together project contributors, Advisory Board members, and implementers from across the ecosystem. Whether you&#x2019;re a seasoned developer or a curious newcomer, this is the place to connect.</p><h3 id="%F0%9F%8C%85-mornings-presentations-and-announcements"><strong>&#x1F305; Mornings: Presentations and Announcements</strong></h3><p>Each day kicks off with a lineup of talks, demos, and lightning presentations that showcase the latest developments across the Xen ecosystem. Expect exciting updates, real-world success stories, and a clear look at where Xen is heading next.</p><h3 id="%F0%9F%A7%A0-afternoons-interactive-design-sessions"><strong>&#x1F9E0; Afternoons: Interactive Design Sessions</strong></h3><p>The afternoon sessions give the community a chance to dive into key topics through an open, collaborative format. Attendees vote on the subjects they want to explore, and the most popular ones are discussed in town hall&#x2013;style sessions. Everyone is welcome to ask questions, share ideas, and help shape Xen&#x2019;s future.</p><h3 id="%F0%9F%A4%9D-backed-by-industry-leaders"><strong>&#x1F91D; Backed by Industry Leaders</strong></h3><p>This year&#x2019;s summit is proudly supported by sponsors including <strong>AMD</strong>, <strong>ARM</strong>, <strong>Honda</strong>, <strong>XenServer</strong>, and <strong>Vates</strong>, with more to be announced soon. Their support reflects the growing momentum behind Xen and a shared commitment to building open, secure, and high-performance virtualization together.</p><h2 id="%F0%9F%93%A3-cfp-still-open%E2%80%A6-we-want-to-hear-from-you-%F0%9F%AB%B5"><strong>&#x1F4E3; CFP Still Open&#x2026; We Want to Hear From You &#x1FAF5;</strong></h2><p>Have something to share? We&#x2019;d love to see your proposal.</p><div class="kg-card kg-callout-card kg-callout-card-pink"><div class="kg-callout-emoji">&#x1F6A8;</div><div class="kg-callout-text">The <b><strong style="white-space: pre-wrap;">Call for Proposals is open until July 1</strong></b>. Whether you&#x2019;re solving problems with Xen, building something new, or have insights to share, this is your opportunity to be part of the program.<br><br>&#x1F449;<a href="https://sessionize.com/xen-summit-2025?ref=xenproject.org"> <u>Submit your talk here</u></a></div></div><h2 id="%F0%9F%91%A5-a-community-powered-future"><strong>&#x1F465; A Community-Powered Future</strong></h2><p>Xen continues to grow as the world&#x2019;s most secure, performant, and open hypervisor because of the people behind it. The summit is more than just an event. It&#x2019;s the premier opportunity to connect, collaborate, and shape the future of virtualization together.</p><p>The Xen Project is proudly hosted by the <strong>Linux Foundation</strong>, helping ensure stable, neutral governance and a sustainable future for the project.</p><p>Whether you&#x2019;re optimizing cloud workloads, securing embedded systems, or building safety-critical platforms, now is the perfect time to get involved&#x2014;or get even more involved&#x2014;with Xen.</p><hr><p>&#x1F517; <strong>Join us this September</strong></p><p>Learn more and register:<a href="https://xenproject.org/resources/xen-summit?ref=xenproject.org"> <u>https://xenproject.org/resources/xen-summit</u></a></p><p>Let&#x2019;s build the future of virtualization, together.</p>]]></content:encoded></item><item><title><![CDATA[Let’s Grow Xen Together!]]></title><description><![CDATA[Xen is open, secure, and built for the future. As the new Community Manager, I’m focused on growing the Xen community, welcoming new contributors, and ensuring a thriving ecosystem. Let’s build the future of virtualization together!]]></description><link>https://xenproject.org/blog/lets-grow-xen-together/</link><guid isPermaLink="false">67d9830a63eb67d1b7d41c92</guid><category><![CDATA[2025]]></category><category><![CDATA[Community]]></category><category><![CDATA[Colllaboration]]></category><dc:creator><![CDATA[Cody Zuschlag]]></dc:creator><pubDate>Tue, 18 Mar 2025 15:01:27 GMT</pubDate><content:encoded><![CDATA[<p>Hey everyone,</p><p>I&#x2019;m excited to step-up to the role of Community Manager for the Xen Project! For those that I haven&#x2019;t met yet, I&#x2019;m Cody Zuschlag. My focus is on growing and strengthening the Xen community: <strong>expanding our contributors, welcoming new members, and ensuring a thriving, collaborative ecosystem</strong>. The Xen project has been supported by some incredible community managers in the past and while their shoes won&apos;t be easy to fill, I&apos;m ready to take on the challenge!</p><h2 id="why-xen"><strong>Why Xen?</strong></h2><p>First, let&apos;s talk about why I love Xen. Xen is <strong>open source, security-first, and built for the future</strong>. It has powered critical infrastructure for decades, and today, its role is more important than ever:</p><ul><li><strong>Modern Data Centers &amp; AI</strong>: With the rapid expansion of AI and cloud workloads, Xen provides a <strong>secure, scalable, and efficient</strong> foundation for virtualization.</li><li><strong>Embedded Systems &amp; Edge Computing</strong>: Xen&#x2019;s strong isolation and stability make it the ideal choice for automotive, industrial IoT, and other mission-critical applications.</li><li><strong>A Cost-Effective, Open Virtualization Solution</strong>: As proprietary virtualization platforms introduce higher costs, more restrictions, and unexpected licensing changes, organizations are looking for flexible, open solutions. Xen-based technologies provide a mature, high-performance alternative that puts businesses in control. All without vendor lock-in.</li></ul><p>And the future? It&apos;s looking very bright... There are some incredible innovations on the way that will be powered by Xen, shaping the next generation of virtualization.</p><h2 id="building-an-even-stronger-more-open-community"><strong>Building an Even Stronger, More Open Community</strong></h2><p>My biggest goal is to expand the contributor community. That means making sure everyone feels welcome to get involved.</p><p>Open source thrives when people with different skills and backgrounds come together. And the best part? You don&#x2019;t have to be a developer to make an impact.</p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F450;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Whether you&#x2019;re contributing code, documentation, testing, security expertise, research, or community support, there&#x2019;s a place for you in Xen.</strong></b></div></div><h2 id="what-i%E2%80%99ll-be-focusing-on"><strong>What I&#x2019;ll Be Focusing On</strong></h2><ul><li><strong>Bringing in new contributors</strong>: Lowering barriers to entry and making it easier for people to get involved.</li><li><strong>Expanding Xen&#x2019;s membership</strong>: Growing the list of organizations and individuals helping to drive the project forward. By working together to create the best foundation, everyone benefits.</li><li><strong>Creating an open and welcoming environment</strong>: A strong community is one where people feel supported, valued, and encouraged to participate.</li><li><strong>Supporting Xen&#x2019;s development</strong>: Helping maintainers, developers, and contributors work more efficiently and effectively.</li><li><strong>Advocating for Xen as the best virtualization technology</strong>: Because it is! Xen&#x2019;s security-first design, maturity, and flexibility make it the top choice for modern virtualization.</li></ul><h2 id="let%E2%80%99s-shape-the-future-of-xen-together"><strong>Let&#x2019;s Shape the Future of Xen Together</strong></h2><p>The Xen Project has a long history of innovation, but its best days are still ahead. Whether you&#x2019;ve been involved for years or are just discovering Xen, I&#x2019;d love to hear from you!</p><p>What&#x2019;s working? What could be better? How can we make Xen even more accessible and impactful?</p><p>Connect with me on <a href="https://matrix.to/?ref=xenproject.org#/@codyzu:matrix.org" rel="noreferrer"><u>Matrix</u></a>, send me an email at <a href="mailto:community.manager@xenproject.org" rel="noreferrer">community.manager@xenproject.org</a>, or connect on <a href="https://www.linkedin.com/in/cody-zuschlag/?ref=xenproject.org"><u>LinkedIn</u></a>.</p><p>Looking forward to working with all of you!</p><p>Cody</p>]]></content:encoded></item><item><title><![CDATA[Xen Project 4.20: A Step Forward in Open Source Virtualization]]></title><description><![CDATA[Xen 4.20 is here! 🚀 This release boosts security, performance, and architecture support, shaping the future of open-source virtualization.]]></description><link>https://xenproject.org/blog/xen-project-4-20-oss-virtualization/</link><guid isPermaLink="false">67ceeb5e63eb67d1b7d41c14</guid><category><![CDATA[Announcements]]></category><category><![CDATA[Releases]]></category><category><![CDATA[2025]]></category><category><![CDATA[xen 4.20]]></category><dc:creator><![CDATA[Cody Zuschlag]]></dc:creator><pubDate>Tue, 11 Mar 2025 13:30:38 GMT</pubDate><content:encoded><![CDATA[<p>The Xen Project has released Xen 4.20 &#x1F389;! This release introduces a range of enhancements that further solidify its position as the premier open-source hypervisor. It delivers important security updates, improved performance, and broader hardware support. Xen has doubled down as the best choice for cloud providers, enterprise users, and embedded system developers.<br><br></p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F4A1;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Why Xen?</strong></b><br><i><em class="italic" style="white-space: pre-wrap;">With strong security, high performance, and cross-architecture support, Xen remains the go-to choice for cloud providers, enterprise users, and embedded system developers.</em></i></div></div><p><br>Read the official <a href="https://www.linuxfoundation.org/press/xen-project-announces-xen-420-release?ref=xenproject.org" rel="noreferrer">Xen Project 4.20 Press Release</a> from the Linux Foundation.</p><h2 id="evolution-of-xen-420-the-big-picture">Evolution of Xen 4.20: The Big Picture</h2><p>Xen 4.20 is not just a routine update. Instead, it reinforces Xen&apos;s clear vision of the future of virtualization. The changes in this release can be grouped into three basic themes. Each theme underscores the Xen Project&apos;s continued growth and relevance in modern computing:</p><h3 id="1-security-is-the-foundation"><br>1. Security is the Foundation</h3><p>Security has always been the key priority of Xen. Version 4.20 yet again demonstrates how Xen&apos;s security stance distinguishes it far above the classic and emerging alternatives. Changes include expanding MISRA C compliance, integrating fuzzing techniques, and enabling UBSAN by default. These changes strengthen Xen&apos;s ability to prevent vulnerabilities at the source.<br><br></p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F510;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Security First:</strong></b><br><i><em class="italic" style="white-space: pre-wrap;">Xen 4.20 reinforces its proactive approach to security by integrating advanced fuzz testing, enforcing MISRA C compliance, and enabling UBSAN by default.</em></i></div></div><p><br>This is yet another example of why open source is the best approach to security-focused development. These security enhancements demonstrate the project&apos;s commitment to proactive threat mitigation. Xen remains the trusted solution for enterprise and cloud environments where isolation and reliability are crucial.</p><h3 id="2-performance-and-optimization-for-modern-workloads"><br>2. Performance and Optimization for Modern Workloads</h3><p>Modern workloads place increasing demands on computing resources. As a result, virtualization platforms must continuously evolve to meet these needs. Xen 4.20 introduces performance optimizations in some key areas. These include guest page-table management, cache utilization, and device passthrough. Paging-Write support on Intel CPUs and AMD Zen 5 optimizations ensure Xen remains competitive with proprietary hypervisors. Improvements to Xen&apos;s hypervisor architecture balance raw performance with system robustness.<br><br></p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x26A1;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">Performance Meets Stability:</strong></b><br><i><em class="italic" style="white-space: pre-wrap;">Xen 4.20 enhances both speed and robustness, making it the ideal hypervisor for everything from large-scale cloud deployments to resource-constrained embedded systems.</em></i></div></div><p><br>This magic combination makes Xen the high performance choice in every situation from cloud-scale deployments to embedded applications.</p><h3 id="3-expanding-the-architectural-footprint"><br>3. Expanding the Architectural Footprint</h3><p>An exciting step towards the future with Xen 4.20 is its expansion to architectures beyond x86 and Arm. The release includes foundational improvements in RISC-V and PowerPC, indicating early-stage development in these architectures. It&apos;s important to note that while these architectures are not yet fully supported, this release introduces key improvements in the boot process and memory management. These improvements pave the way for broader support in future releases.<br><br></p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F4A1;</div><div class="kg-callout-text"><b><strong style="white-space: pre-wrap;">A Future-Ready Hypervisor:</strong></b><br><i><em class="italic" style="white-space: pre-wrap;">As industry trends shift toward alternative architectures like RISC-V and Arm, Xen is evolving to meet tomorrow&#x2019;s computing demands today.</em></i></div></div><p><br>Industry trends are shifting toward alternative processor architectures, and Xen is keeping pace. Experimental ARMv8-R and added compatibility for the NXP S32G3 processor family demonstrate Xen&apos;s ambition to be a truly multi-platform hypervisor. Xen is capable of running on a wide range of hardware configurations. As computing environments continue to diversify, Xen is positioning itself as a versatile solution. While RISC-V is gaining traction as an emerging architecture, PowerPC improvements remain focused on legacy support.</p><h2 id="xen-420-key-highlights">Xen 4.20 Key Highlights</h2><p>Building on the above categories, this release introduces multiple technical enhancements in security, performance, and architecture. Here&apos;s a short list:</p><h3 id="security-code-quality-enhancements">Security &amp; Code Quality Enhancements</h3><ul><li>Expanded MISRA C compliance: The integration of the ECLAIR MISRA C scanner in GitLab CI now enforces 90 rules with zero unjustified violations, strengthening Xen&#x2019;s code safety.</li><li>UBSAN (Undefined Behavior Sanitizer) enabled by default in the CI for x86, Arm64, RISC-V, and PowerPC.</li><li>Two existing fuzzing harnesses integrated into OSSFuzz to proactively identify and mitigate potential vulnerabilities.</li></ul><h3 id="core-hypervisor-improvements">Core Hypervisor Improvements</h3><ul><li>Fixes in the blkif protocol specification for non-512b sector sizes.</li><li>The domain builder in libxenguest now defers un-gzipping secondary modules to the guest kernel, optimizing memory and performance.</li><li>Enhancements to bit-operation helpers and improvements in Xen&#x2019;s common/arch code split for better maintainability.</li></ul><h3 id="expanded-architecture-support">Expanded Architecture Support</h3><p><br><strong>x86 Enhancements</strong></p><ul><li>Intel Paging-Write Feature support, improving guest page-table update efficiency and reducing EPT violation overhead.</li><li>AMD Zen 5 CPU support, including mitigations for the SRSO speculative vulnerability.</li><li>UEFI firmware boot improvements, avoiding problematic GetTime() and ResetSystem() runtime methods to enhance compatibility.</li><li>Deprecated support for Xeon Phi processors and x2APIC Cluster Mode.</li></ul><p><br><strong>Arm Enhancements</strong></p><ul><li>Last Level Cache (LLC) coloring for better performance optimization.</li><li>Experimental Armv8-R support and support for the NXP S32G3 processor family.</li><li>FF-A improvements: Indirect message support and enhanced buffer transmission.</li><li>Xen moves closer to functional safety certification with 43 new structured requirements, using OpenFastTrace for requirement linking.</li></ul><p><br><strong>Early-Stage RISC-V and PowerPC Development</strong></p><ul><li>RISC-V: Initial enhancements in device tree mapping and memory management initialization.</li><li>PowerPC: Early improvements in boot allocation.</li></ul><h2 id="security-fixes-and-industry-support">Security Fixes and Industry Support</h2><p>During the 4.20 development cycle, eight Xen Security Advisories (XSAs) were published. Four fixes in the hypervisor, one fix in the toolstack, one clarification on supported use cases, and two fixes in external projects.</p><p>This release was made possible with contributions from major industry players including AWS, ARM, AMD, HONDA, EPAM, Vates, and XenServer. This collaboration demonstrates that Xen continues to evolve as the trusted solution in cloud computing, security applications, and embedded systems.</p><h2 id="the-growth-and-future-of-xen">The Growth and Future of Xen</h2><p>The Xen Project has come a long way since its origin in academia. It has evolved into a powerful and adaptable hypervisor used in enterprise, cloud, and embedded systems. Xen&apos;s continued focus on security, performance, and cross-architecture support demonstrates a clear reality: the project remains relevant in an ever-changing technology landscape.</p><p>Industry leaders are backing and contributing at increased levels. Use cases for Xen are expanding. Xen is on a clear trajectory toward functional safety certification. The future of Xen is brighter than ever. Now with support for emerging architectures like RISC-V and enhanced ARM integration. Xen is poised to be the best option for next-generation computing environments.</p><p>As organizations prioritize security, performance, and flexibility in virtualization, open-source solutions are becoming the standard. With its latest advancements, Xen remains the clear leader in this space. The Xen 4.20 release doubles down on Xen&apos;s commitment to innovation.</p><h2 id="%F0%9F%9A%80-join-the-community">&#x1F680; Join the Community!</h2><p>Xen 4.20 is just the beginning. We invite <strong>developers, enterprises, and cloud providers</strong> to contribute, collaborate, and push <strong>open-source virtualization</strong> forward.</p><p>&#x1F449; <a href="https://xenproject.org/?ref=xenproject.org" rel="noopener"><strong>Get Involved Here</strong></a></p>]]></content:encoded></item><item><title><![CDATA[Xen Project Winter Meetup]]></title><description><![CDATA[<p>We just wrapped up the Xen Winter Meetup 2025. It was an amazing opportunity to push Xen forward in a way that can only happen when people get together in person. Organized by Vates, we hosted it at the University of Grenoble IMAG building, a great spot for cutting-edge research</p>]]></description><link>https://xenproject.org/blog/xen-project-winter-meetup/</link><guid isPermaLink="false">67add7db63eb67d1b7d41bfc</guid><dc:creator><![CDATA[Kelly Choi]]></dc:creator><pubDate>Thu, 13 Feb 2025 11:33:03 GMT</pubDate><content:encoded><![CDATA[<p>We just wrapped up the Xen Winter Meetup 2025. It was an amazing opportunity to push Xen forward in a way that can only happen when people get together in person. Organized by Vates, we hosted it at the University of Grenoble IMAG building, a great spot for cutting-edge research in computer science and virtualization. Our goal?&#xA0;<strong>Accelerate Xen&#x2019;s development, bring in fresh minds, and foster stronger ties between industry and academia</strong>.</p><h2 id="%F0%9F%90%BC-why-we-did-it">&#x1F43C; Why we did it</h2><p>The idea for this meetup started&#xA0;<a href="https://xenprojectsummit2024.sched.com/event/1bCMf/design-session-a-the-future-of-xen-project-physical-events?ref=xenproject.org" rel="noreferrer">at the last Xen Summit</a>, where a design session revealed how much progress can be made when we sit down and tackle challenges head-on. Xen Summit itself is fantastic, with deep technical talks and important roadmap discussions, but we wanted to take things further. There&#x2019;s something special about in-person brainstorming that no online discussion can replace.</p><p>We decided to double down on what makes the&#xA0;<strong>Xen community great</strong>: collaboration, innovation, and a shared passion for building a better virtualization stack. Furthermore, we found an opportunity to expand our reach. Xen needs more contributors. However, developers often don&#x2019;t even realize they can get involved. By hosting this meetup, our objective was to make it easier for people&#x2014;especially students and researchers&#x2014;to step in, learn, and contribute.</p><p>Grenoble was the perfect location to realize our objecctives. The city is home to some top-tier research teams, like&#xA0;<a href="https://www.liglab.fr/en/research/research-teams/krakos?ref=xenproject.org" rel="noreferrer"><strong>KrakOS at LIG</strong></a>, who specialize in&#xA0;<strong>virtualization, OS design, and cloud infrastructure</strong>. We knew bringing Xen developers and researchers together would spark new ideas and open doors for up-and-coming contributors. With seasoned Xen devs mentoring newer ones, we&#x2019;re keeping knowledge sharing alive and ensuring the stability of the project for years to come.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_IMAG.jpg" class="kg-image" alt loading="lazy" width="1280" height="973"><figcaption><span style="white-space: pre-wrap;">The IMAG, home of the Xen Winter Meetup 2025 (Grenoble)</span></figcaption></figure><h3 id="a-fully-independent-xen-meetup">A fully independent Xen meetup</h3><p>We also wanted to prove that a&#xA0;<strong>Xen-focused event</strong>&#xA0;could be community driven without high-cost partners while remaining accessible to all. Hosting it ourselves meant we had full control over the agenda, keeping the focus 100% on what benefits the Xen community. We didn&#x2019;t need a huge budget: just amazing people with a shared commitment to making Xen better.</p><h2 id="%E2%8F%A9-a-packed-but-well-paced-meetup">&#x23E9; A packed but well-paced meetup</h2><p>We ran the Xen Winter Meetup over two days, striking a balance between structured sessions and free-flowing discussions. Mornings were packed with talks, where developers and researchers shared their latest work, while afternoons were all about design sessions: getting hands-on and tackling real technical challenges together.</p><p>We were very pleased with the format. Too often conferences cram in endless back-to-back talks, leaving everyone mentally drained by the end of the day. We wanted something different, something that kept the energy high and made room for actual problem-solving. By keeping the mornings focused on presentations and reserving the afternoons for in-depth discussions, we avoided mental burnout and got the best of both worlds.</p><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_DesignSessions.jpg" width="1280" height="853" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XMW_Caleb.jpg" width="853" height="1280" loading="lazy" alt></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_CleverCloud.jpg" width="1280" height="853" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_Intro.jpg" width="1280" height="853" loading="lazy" alt></div></div></div></figure><h3 id="the-main-talks">The main talks</h3><p>Olivier kicked things off with a quick&#xA0;<strong>intro talk</strong>, covering why we organized this event and some logistics details.</p><p>From there,&#xA0;<strong>Kelly (Xen Community Manager)</strong>&#xA0;gave us a&#xA0;<a href="https://nextcloud.vates.tech/index.php/s/FKPmeSmyjX52WXd?ref=xenproject.org" rel="noreferrer"><strong>Xen Project weather report</strong></a>, looking at recent successes and transformations within the project. It was a great way to set the stage for what&#x2019;s ahead and highlight how Xen continues to evolve.</p><p>Then we got into the meaty technical talks.&#xA0;<strong>Teddy (Vates)</strong>&#xA0;gave an insightful presentation on&#xA0;<a href="https://nextcloud.vates.tech/index.php/s/gzsLqo2bDB9Ce3q?ref=xenproject.org" rel="noreferrer"><strong>Rust within the Xen Project</strong></a>, showcasing the work being done to bring memory safety and modern tooling into the hypervisor.&#xA0;<strong>Andrew (Citrix)</strong>&#xA0;followed with an overview of&#xA0;<a href="https://nextcloud.vates.tech/index.php/s/Esm9xBs8m4xKAby?ref=xenproject.org" rel="noreferrer"><strong>key improvements and opportunities in the Xen Hypervisor</strong></a>, essentially laying out a roadmap for where we need to focus our efforts in the coming months and years. This talk is definitely one to keep in mind, as it&#x2019;s going to serve as a reference for major Xen development moving forward.</p><p><strong>Andrei (Vates)</strong>&#xA0;then took the stage to go over our progress on&#xA0;<a href="https://nextcloud.vates.tech/index.php/s/AWBa5w2LTZkAF2B?ref=xenproject.org" rel="noreferrer"><strong>getting AMD SEV support into Xen</strong></a>, a critical piece for enhancing security and workload isolation. On Friday,&#xA0;<strong>Piotr (3MDeb)</strong>&#xA0;presented a fascinating talk on&#xA0;<a href="https://nextcloud.vates.tech/index.php/s/ar7kan5dcJqAjRH?ref=xenproject.org" rel="noreferrer"><strong>host Secure Boot for XCP-ng</strong></a>, showing how it can be done properly&#x2014;and within a week, they already had a working proof of concept! It was really engaging to see just how thin the layers between hardware, firmware, and Xen/XCP-ng really are.</p><p>We also had some great contributions from academia.&#xA0;<strong>L&#xE9;o (University of Rennes)</strong>&#xA0;gave a talk about&#xA0;<a href="https://nextcloud.vates.tech/index.php/s/2SDqr7KJfz6KLfo?ref=xenproject.org" rel="noreferrer"><strong>using Xen to analyze VM memory without being detected by malware</strong></a>&#x2014;a true cat-and-mouse game between attackers and defenders.&#xA0;<strong>Caleb (University of Grenoble)</strong>&#xA0;followed with his research on&#xA0;<strong>Xen&#x2019;s behavior when migrating between heterogeneous CPUs</strong>. This isn&#x2019;t published yet, but once it is, we&#x2019;ll definitely share more details in a future post!</p><p>Back to Xen development,&#xA0;<strong>Thierry (Vates)</strong>&#xA0;provided a&#xA0;<a href="https://nextcloud.vates.tech/index.php/s/a7S9WDZmfB9GB3G?ref=xenproject.org" rel="noreferrer"><strong>recap of the Q35 work and what&#x2019;s next</strong></a>, with some valuable insights from Andrew on key architectural decisions. Finally,&#xA0;<strong>Julien (Clever Cloud)</strong>&#xA0;wrapped up the talks with a real-world use case, showing how they use&#xA0;<a href="https://nextcloud.vates.tech/index.php/s/BLkYFbpErLcoYM2?ref=xenproject.org" rel="noreferrer"><strong>XCP-ng + Xen Orchestra (Vates VMS) in their PaaS platform</strong></a>, and how it could help businesses migrate away from VMware.</p><p>Every talk brought something unique to the table, making it clear that Xen&#x2019;s ecosystem is alive, evolving, and tackling exciting challenges head-on!</p><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_Kelly.jpg" width="853" height="1280" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_Q35.jpg" width="1280" height="853" loading="lazy" alt></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_Break.jpg" width="1280" height="853" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_Break2.jpg" width="1280" height="853" loading="lazy" alt></div></div></div></figure><h3 id="design-sessions-an-essential-tool-for-collaboration">Design sessions: an essential tool for collaboration</h3><p>One of the biggest strengths of this meetup was the design sessions. These weren&#x2019;t just regular talks&#x2014;they were interactive, hands-on discussions where we reconfigured the room, formed a big circle, grabbed a whiteboard, and got straight to problem-solving. This setup made a huge difference. Instead of just listening, everyone actively contributed to shaping Xen&#x2019;s future, discussing architecture, features, and the next steps for key developments. All while leaving room to deep dive into any challenging topics.</p><p>A lot of important topics were tackled:&#xA0;<strong>PVH virtualization mode, nested virtualization, and the Xen IOMMU we&#x2019;re bringing upstream</strong>. The second day opened up even more diverse discussions, with a dedicated session on&#xA0;<strong>&#x201C;Getting Started with Xen&#x2019;s Codebase&#x201D;</strong>, making it easier for newcomers to contribute, and another on&#xA0;<strong>&#x201C;Strengthening Collaboration Between Xen and Academia&#x201D;</strong>, which led to concrete action points.</p><p>These sessions didn&#x2019;t just help move technical topics forward&#x2014;they helped build stronger relationships between teams from different companies and universities. And that&#x2019;s the real magic of these events and the greater Xen community. When people connect and collaborate in person, the effects ripple far beyond the meetup itself. We believe the relationships built here will make upstream development smoother and more efficient, ensuring that Xen continues to evolve with input from a diverse and engaged community.</p><h3 id="it-was-also-about-cheese-and-computers">It was also about cheese and computers</h3><p>A Winter Meetup in the Alps without cheese? Not happening. So, of course, we organized a proper fondue night, because what better way to wrap up intense discussions than by almost drowning in melted cheese (we survived&#x2026; barely).</p><p>These social moments are just as important as the technical ones. When you step away from deep-dive discussions and just hang out, real connections start to form. And that&#x2019;s what makes long-term collaboration easier. When you&#x2019;re working with people across time zones and only interacting through screens, having shared memories from a night like this changes everything. It&#x2019;s no longer just &#x201C;someone from another company&#x201D; on the other side of an email&#x2014;it&#x2019;s someone you&#x2019;ve had a laugh with, debated with, and maybe even fought over the last piece of bread.</p><p>The Xen community is diverse and thriving. It&apos;s a place where folks from all walks of life can come together and work towards a common goal and passion. These special moments let this wide variety of folks connect and hopefully build lasting bonds. The community is welcoming and ready to accept new contributors!</p><p>At the end of the day, these meetups aren&#x2019;t just about code: they&#x2019;re about strengthening the Xen community as a whole, and sometimes, all it takes is a good meal to turn colleagues into actual friends.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_Fondue-1.jpg" class="kg-image" alt loading="lazy" width="1280" height="822"><figcaption><span style="white-space: pre-wrap;">One of four large tables, fully prepped and ready to welcome a serious cheese feast!</span></figcaption></figure><p><strong>What about computers, and very old ones?</strong>&#xA0;What&#x2019;s a meetup full of virtualization and OS enthusiasts without a deep dive into computing history? We couldn&#x2019;t pass up the chance to take everyone to&#xA0;<a href="https://www.aconit.org/spip/spip.php?page=sommaire-eng&amp;ref=xenproject.org" rel="noreferrer"><strong>ACONIT</strong></a>, home to one of the most incredible computer collections in the world.</p><p>From the very&#xA0;<strong>first machines of the 19th century</strong>&#xA0;to rare and iconic hardware like mainframes, early IBM computers, analog machines, and legendary personal computers, the visit was a time-travel experience through the evolution of computing. Seeing these machines up close&#x2014;some of which laid the groundwork for everything we work on today&#x2014;was a humbling reminder of how far we&#x2019;ve come.</p><p>And let&#x2019;s be honest, for a room full of tech people, this was geek heaven. It was another highlight of the meetup, adding a unique touch that made this gathering not just about Xen, but about celebrating the whole history of computing.</p><figure class="kg-card kg-gallery-card kg-width-wide"><div class="kg-gallery-container"><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_ACONIT2.jpg" width="1280" height="853" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_ACONIT-1.jpg" width="853" height="1280" loading="lazy" alt></div></div><div class="kg-gallery-row"><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_ACONIT3.jpg" width="1280" height="853" loading="lazy" alt></div><div class="kg-gallery-image"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_ACONIT4.jpg" width="1280" height="853" loading="lazy" alt></div></div></div></figure><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F5A5;&#xFE0F;</div><div class="kg-callout-text">A word on ACONIT:<b><strong style="white-space: pre-wrap;">ACONIT, the Association for a Conservatory of Information Technology, founded in 1985</strong></b>&#xA0;with principle objective of preserving the history of computing and creating tools to better understand and explain to the general public the risks and rewards of current developments in the information processing as it permeates deeper into society. You can read more<a href="https://www.aconit.org/spip/spip.php?page=sommaire-eng&amp;ref=xenproject.org" rel="noreferrer">on their website</a>.</div></div><h2 id="%F0%9F%8E%AF-our-take-on-the-meetup">&#x1F3AF; Our take on the meetup</h2><p>First off&#x2014;<strong>huge kudos to everyone who made this happen!</strong>&#xA0;A big thanks to all the attendees; nearly everyone who signed up showed up, despite flu season trying to mess with our numbers. Out of a max capacity of 50, we had 47 people in the room. That was seriously impressive for such a deep technical gathering in Grenoble.</p><p>This wouldn&#x2019;t have been possible without the University of Grenoble generously hosting us and, of course, the amazing Vates team, who made sure everything ran smoothly so that we could focus on discussions, not logistics.</p><p>Beyond just being a great moment for the Xen community, this meetup proved something important:&#xA0;<strong>a Xen board member can organize a high-impact gathering at a very reasonable cost, all while accelerating real collaboration.</strong>&#xA0;No need for huge conference budgets&#x2014;just the right people, the right topics, and a shared drive to move Xen forward.</p><p>In the end, we achieved all of our goals. We brought more people together around Xen&#x2019;s future, and the mix of attendees was incredible:&#xA0;<strong>IaaS providers, hardware manufacturers, academic researchers, software vendors, and experts&#x2014;all in the same room, actively shaping what&#x2019;s next.</strong></p><p>This wasn&#x2019;t just a meetup. It was a step forward for Xen&#x2019;s long-term success and we&#x2019;re incredibly proud of what we built together.</p><p>Thanks for coming and we look forward to the next meetup!</p><figure class="kg-card kg-image-card"><img src="https://xcp-ng.org/blog/content/images/2025/02/XWM_attendees-1.jpg" class="kg-image" alt loading="lazy" width="1280" height="853"></figure><p>Blog post content courtesy of Olivier Lambert, Vates. </p>]]></content:encoded></item><item><title><![CDATA[Welcome Honda to the Xen Project Board]]></title><description><![CDATA[<p>We&apos;re excited to announce our newest Advisory Board Member Honda, to Xen Project.</p><p><br>Since its foundation, Honda has been committed to &quot;creating a society that is useful to people&quot; by utilizing its technologies and ideas. Honda also focuses on environmental responsiveness and traffic safety, and continue</p>]]></description><link>https://xenproject.org/blog/welcome-honda-to-xen-project/</link><guid isPermaLink="false">6751d3d563eb67d1b7d41bbc</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[Kelly Choi]]></dc:creator><pubDate>Mon, 09 Dec 2024 14:10:03 GMT</pubDate><media:content url="https://xenproject.org/blog/content/images/2024/12/hondardco.ltd.-1.svg" medium="image"/><content:encoded><![CDATA[<img src="https://xenproject.org/blog/content/images/2024/12/hondardco.ltd.-1.svg" alt="Welcome Honda to the Xen Project Board"><p>We&apos;re excited to announce our newest Advisory Board Member Honda, to Xen Project.</p><p><br>Since its foundation, Honda has been committed to &quot;creating a society that is useful to people&quot; by utilizing its technologies and ideas. Honda also focuses on environmental responsiveness and traffic safety, and continue to take on the challenge of realizing a sustainable future.<br><br>I am sure that the community will agree that this is a huge step and achievement for our open source project. Honda&apos;s investment into supporting Xen means we are expanding our efforts to create a more secure and versatile hypervisor, with real world applications. Their commitment and partnership with Xen only increase the capabilities that our virtualization technology has achieved so far.<br><br>With Honda joining, their insights will help us navigate new challenges, expand our outreach to new contributors and enhance policies surrounding our community.<br><br>Their unique perspective will be invaluable as we tackle goals for the future, and we&#x2019;re thrilled to have their voice guiding our strategy and vision.<br><br>Please join us in giving a warm welcome to Honda! We&#x2019;re eager to see how their leadership and technical teams will help shape the future of the Xen Project. Together, we&#x2019;ll continue building a strong, inclusive, and innovative community.<br><br>Kelly,<br><br>Community Manager</p>]]></content:encoded></item><item><title><![CDATA[Say hello to our new website]]></title><description><![CDATA[<p>Hello Xen Community,</p><p>You may have noticed something different...</p><p>We&apos;ve refreshed our existing website! </p><figure class="kg-card kg-image-card"><img src="https://xenproject.org/blog/content/images/2024/12/Screenshot-2024-12-05-at-15.24.29.png" class="kg-image" alt="Xen Project New Website 2024" loading="lazy" width="1108" height="808" srcset="https://xenproject.org/blog/content/images/size/w600/2024/12/Screenshot-2024-12-05-at-15.24.29.png 600w, https://xenproject.org/blog/content/images/size/w1000/2024/12/Screenshot-2024-12-05-at-15.24.29.png 1000w, https://xenproject.org/blog/content/images/2024/12/Screenshot-2024-12-05-at-15.24.29.png 1108w" sizes="(min-width: 720px) 720px"></figure><p>Why did we do this? </p><p>Well, all these new changes are part of an ongoing effort to increase our visibility and make it easier to find information on pages. We know how important it</p>]]></description><link>https://xenproject.org/blog/say-hello-to-our-new-website/</link><guid isPermaLink="false">6751bfa763eb67d1b7d41b87</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[Kelly Choi]]></dc:creator><pubDate>Thu, 05 Dec 2024 15:09:12 GMT</pubDate><content:encoded><![CDATA[<p>Hello Xen Community,</p><p>You may have noticed something different...</p><p>We&apos;ve refreshed our existing website! </p><figure class="kg-card kg-image-card"><img src="https://xenproject.org/blog/content/images/2024/12/Screenshot-2024-12-05-at-15.24.29.png" class="kg-image" alt="Xen Project New Website 2024" loading="lazy" width="1108" height="808" srcset="https://xenproject.org/blog/content/images/size/w600/2024/12/Screenshot-2024-12-05-at-15.24.29.png 600w, https://xenproject.org/blog/content/images/size/w1000/2024/12/Screenshot-2024-12-05-at-15.24.29.png 1000w, https://xenproject.org/blog/content/images/2024/12/Screenshot-2024-12-05-at-15.24.29.png 1108w" sizes="(min-width: 720px) 720px"></figure><p>Why did we do this? </p><p>Well, all these new changes are part of an ongoing effort to increase our visibility and make it easier to find information on pages. We know how important it is for both users and wider stakeholders to learn about project, progress and ways to contribute. </p><p>Our documentation will still link to our old wiki for now, as this is where most of our guides are stored. However, you might remember we are in the process of moving to Sphinx so we will eventually update the website once we have more content created. We welcome community members to contribute to this!</p><p>Have fun exploring what&apos;s new on our website, and we hope to see you hang around our <a href="https://xenproject.org/resources/matrix/?ref=xenproject.org" rel="noreferrer">matrix channels</a>. You&apos;ll find most of our developers and members there, and it&apos;s also a place to ask more questions. </p><p>If you do have any feedback or notice errors, please feel free to reach out.</p><p>Kelly,</p><p>Community Manager</p>]]></content:encoded></item><item><title><![CDATA[Xen Project Announces Performance and Security Advancements with Release of 4.19]]></title><description><![CDATA[<!--kg-card-begin: html-->
<p><strong>New release marks significant enhancements in performance, security, and versatility across various architectures.&#xA0;</strong></p>
<p>SAN FRANCISCO &#x2013; July 31st, 2024 &#x2013;&#xA0;<a href="https://xenproject.org/about-us/join-as-a-corporate-member/?ref=xenproject.org" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="5e59d3cf27f56a08159cd952">The Xen Project</a>,&#xA0;an open source project under the Linux Foundation, is proud to announce the release of Xen Project 4.19. This release marks a significant</p>]]></description><link>https://xenproject.org/blog/xen-project-announces-performance-and-security-advancements-with-release-of-4-19/</link><guid isPermaLink="false">66f3de4272d3ac07b46d9c05</guid><category><![CDATA[Announcements]]></category><dc:creator><![CDATA[Kelly Choi]]></dc:creator><pubDate>Mon, 05 Aug 2024 01:50:35 GMT</pubDate><content:encoded><![CDATA[
<!--kg-card-begin: html-->
<p><strong>New release marks significant enhancements in performance, security, and versatility across various architectures.&#xA0;</strong></p>
<p>SAN FRANCISCO &#x2013; July 31st, 2024 &#x2013;&#xA0;<a href="https://xenproject.org/about-us/join-as-a-corporate-member/?ref=xenproject.org" target="_blank" rel="noopener" data-feathr-click-track="true" data-feathr-link-aids="5e59d3cf27f56a08159cd952">The Xen Project</a>,&#xA0;an open source project under the Linux Foundation, is proud to announce the release of Xen Project 4.19. This release marks a significant milestone in enhancing performance, security, and versatility across various architectures, including Arm, PPC, RISC-V, and x86, altogether providing a robust and secure hypervisor solution for both enterprises and cloud providers.</p>
<p>The Xen Project continues to lead the way in virtualization technology. With contributions from a wide and diverse range of companies, including board members AMD, ARM, AWS, EPAM, Vates, and XenServer, Xen Project 4.19 introduces a range of key changes and improvements that solidify its position as a premier open-source virtualization platform. Comprehensive improvements include substantial enhancements in memory management, security, and system stability, spanning multiple architectures and benefitting a wide array of users and use cases.</p>
<p>&#x201C;The 4.19 release is a significant achievement for the Xen community, bringing crucial enhancements across all supported architectures,&#x201D; said Kelly Choi, Community Manager at the Xen Project. &#x201C;New features such as the x2APIC driver for x86 and dynamic node programming for Arm highlight our focus on meeting the evolving needs of our users, and underscores our dedication to advancing virtualization technology with a robust, reliable and open source hypervisor.&#x201D;</p>
<p>&#xA0;</p>
<p><strong>Notable Improvements in Release 4.19 Include:</strong></p>
<p>&#xA0;</p>
<p><strong>Security Enhancements</strong></p>
<ul>
<li>Published 13 new Xen Security Advisories (XSAs) to mitigate vulnerabilities.</li>
<li>Adoption of additional MISRA-C rules for improved code quality.</li>
</ul>
<p><strong>Arm Architecture</strong></p>
<ul>
<li>&#xA0;Introduction of dynamic node programming using overlay dtbo.</li>
<li>&#xA0;FF-A notification support</li>
</ul>
<p>&#xA0;</p>
<p><strong>x86 Architecture</strong></p>
<ul>
<li>Introduce a new x2APIC driver that uses Cluster Logical addressing mode for IPIs and physical addressing mode for external interrupts.</li>
<li>Deprecate support for XeonPhi in 4.19, with the firm plan to remove support in 4.20.</li>
</ul>
<p><strong>PVH</strong></p>
<ul>
<li>PVH dom0 has now moved to &#x201C;supported with caveats&#x201D; status&#x200B;&#x200B;&#x200B;&#x200B;&#x200B;&#x200B;&#x200B;</li>
<li>PVH/HVM can now map foreign pages, which should for example allow QEMU stubdomains to run as PVH</li>
<li>Boot time speedup due to the IOMMU changes</li>
<li>Don&#x2019;t expose pIRQ support to HVM guests by default.&#xA0; The feature (XENFEAT_hvm_pirqs) can now be enabled on a per-domain basis</li>
</ul>
<p>&#xA0;</p>
<p><strong>Other updates:</strong></p>
<ul>
<li>Add a new 9pfs backend running as a daemon in dom0. First user is Xenstore-stubdom now being able to support full Xenstore trace capability.</li>
<li>libxl support for backendtype=tap with tapback.</li>
</ul>
<ul>
<li>Increase the maximum number of CPUs Xen can be built for from 4095 to 16383.</li>
<li>When building with Systemd support (./configure &#x2013;enable-systemd), remove</li>
</ul>
<p>libsystemd as a build dependency.&#xA0; Systemd Notify support is retained, now</p>
<p>using a standalone library implementation.</p>
<ul>
<li>xenalyze no longer requires `&#x2013;svm-mode` when analyzing traces generated on AMD CPUs.</li>
<li>Code symbol annotations and MISRA compliance improvements.</li>
<li>CI updates:</li>
</ul>
<ul>
<li>Minimum fixes to rebuild the containers, following the HEREDOC problems.</li>
<li>Rebuild containers to have testing with up-to-date LTS distros.</li>
<li>Few build system checks, and strip the obsolete contents of the build containers.</li>
</ul>
<p>&#xA0;</p>
<p>The Xen Project 4.19 release underscores the community&#x2019;s commitment to advancing virtualization technology. Visit the Xen Project&#xA0;<a href="https://xenproject.org/?ref=xenproject.org" data-feathr-click-track="true" data-feathr-link-aids="5e59d3cf27f56a08159cd952">website</a>&#xA0;to learn more, and join the conversation by signing up for the Xen Project&#xA0;<a href="https://xenproject.org/help/mailing-list/?ref=xenproject.org" data-feathr-click-track="true" data-feathr-link-aids="5e59d3cf27f56a08159cd952">mailing list</a>&#xA0;and&#xA0;<a href="https://matrix.to/?ref=xenproject.org#/#XenProject:matrix.org" data-feathr-click-track="true" data-feathr-link-aids="5e59d3cf27f56a08159cd952">Matrix</a>.</p>
<p>&#xA0;</p>
<p><strong>Supporting Quotes</strong></p>
<p>&#xA0;</p>
<p>&#x201C;AMD looks forward to embracing the advancements in the Xen 4.19 release. With MISRA C compliance nearing completion, this milestone brings us closer to a safety-certifiable hypervisor. &#xA0; Additionally, the support for Device Tree overlays for dynamic VM configurations significantly enhances Xen&#x2019;s flexibility with AMD FPGAs and adaptive SoCs, positioning&#xA0; it as a robust solution for critical embedded applications.&#x201D;</p>
<p><strong>&#x2013; Kris Chaplin, Open Source Software Lead &#x2013; Systems Engineering, AMD.&#xA0;</strong></p>
<p>&#xA0;</p>
<p>&#x201C;As a proud board member of the Xen Project, XenServer is thrilled to witness the release of Xen 4.19. This new release signifies a remarkable stride in code safety and memory management across various architectures. At XenServer, we are committed to our collaboration with the community to contribute to the future of the Xen hypervisor. We look forward to integrating these enhancements in security and performance into the XenServer product, ensuring that our users can leverage the latest advancements in virtualisation technology.&#x201D;</p>
<p><strong>&#x2013; Diego Novellon, Software Engineering Manager, XenServer</strong></p>
<p>&#xA0;</p>
<p>&#x201C;At Vates, we are pleased with the continuous advancements of the Xen project and are proud to contribute to its progress. Notably, Oleksii, one of our dedicated XCP-ng developers, served as the release manager for Xen 4.19. Currently, we are involved in the AMD SEV projects and the Xen port to RISC-V. Alongside other board members, we continue to elevate the Xen project&#x2019;s visibility, ensuring it is recognized not only by its contributors but also within the virtualization sector. Beyond this release, we remain deeply committed to expanding the Xen project&#x2019;s reach by building bridges with other communities and the academic world, fostering broader collaboration and innovation through teamwork.&#x201D;</p>
<p><strong>&#x2013; Olivier Lambert, CEO, Vates</strong></p>
<p>&#xA0;</p>
<p>&#x201C;Arm is the platform of choice for a vast ecosystem of developers, and our ongoing work with the Xen Project continues to be an important part of our commitment to the open source software community. Virtualization is critical to applications like automotive,&#xA0;where the XEN Hypervisor is part of the SOAFEE open source reference implementation, and the release of Xen 4.19 brings significant improvements in dynamic node programming for the Arm architecture. We look forward to seeing how developers leverage this new release for future automotive use-cases on Arm.&#x201D;</p>
<p><strong>&#xA0;&#x2013; Andrew Wafaa, senior director, Software Communities at Arm&#xA0;</strong></p>
<p>&#xA0;</p>
<hr>
<p>&#xA0;</p>
<p><strong>About the Xen Project</strong></p>
<p>&#xA0;</p>
<p>The Xen Project is the home for several virtualization-related open source projects and is licensed under the GPLv2. Hosted by the Linux Foundation, Xen Project is focused on advancing virtualization in a number of different commercial and open source applications, including server virtualization, Infrastructure as a Services (IaaS), desktop virtualization, security applications, embedded and hardware appliances, and automotive/aviation. For more information visit&#xA0;<a href="http://xenproject.org/?ref=xenproject.org" data-feathr-click-track="true" data-feathr-link-aids="5e59d3cf27f56a08159cd952">XenProject.org</a>.</p>
<p>&#xA0;</p>
<p>Media Contact:</p>
<p>Noah Lehman</p>
<p>The Linux Foundation</p>
<p>nlehman@linuxfoundation.org</p>

<!--kg-card-end: html-->
]]></content:encoded></item><item><title><![CDATA[Upcoming Closure of Xen Project Colo Facility]]></title><description><![CDATA[<!--kg-card-begin: html-->
<p><span style="font-weight: 400">Dear Xen Community,</span></p>
<p><span style="font-weight: 400">We regret to inform you that the Xen Project is currently experiencing unexpected changes due to the sudden shutdown of our colocated (colo) data center facility by Synoptek. This incident is beyond our control and will impact the continuity of OSSTest (the gating Xen Project CI loop)</span></p>]]></description><link>https://xenproject.org/blog/upcoming-closure-of-xen-project-colo-facility/</link><guid isPermaLink="false">66f3de4272d3ac07b46d9c04</guid><dc:creator><![CDATA[Kelly Choi]]></dc:creator><pubDate>Wed, 10 Jul 2024 04:21:43 GMT</pubDate><content:encoded><![CDATA[
<!--kg-card-begin: html-->
<p><span style="font-weight: 400">Dear Xen Community,</span></p>
<p><span style="font-weight: 400">We regret to inform you that the Xen Project is currently experiencing unexpected changes due to the sudden shutdown of our colocated (colo) data center facility by Synoptek. This incident is beyond our control and will impact the continuity of OSSTest (the gating Xen Project CI loop), which we heavily rely on as a project. We understand the inconvenience this may cause to our users and stakeholders, and we are working diligently to consider different solutions as swiftly as possible.</span></p>
<p><span style="font-weight: 400">What Happened?</span></p>
<p><span style="font-weight: 400">We received a notification from our colo facility provider Synoptek indicating the shutdown of their services in Marlborough, where our current facility is located. As a result, the OSSTest instance hosted at this facility will likely be disrupted with an anticipated shutdown date of October 31st, 2024.</span></p>
<p><span style="font-weight: 400">Potential Impact</span></p>
<p><span style="font-weight: 400">The potential consequence of this shutdown may mean availability of OSSTest will be impacted, therefore affecting the number of bugs being caught. Contributors may experience quality issues with code, or face slower response times as our technical community spends more time resolving issues. We are aware of the critical nature of the services we provide and the significant impact this downtime may have.</span></p>
<p><span style="font-weight: 400">Our Response</span></p>
<p><span style="font-weight: 400">We are in constant communication with the colo facility provider, our IT contractors, and our Board Members to understand the scope of the problem and the estimated time for resolution. Additionally, we are exploring alternative solutions to restore our services as quickly as possible. These measures include:</span></p>
<p><b>Engaging with the Colo Facility Provider (Synoptek): </b><span style="font-weight: 400">We are working with the provider to negotiate costs and the likelihood of us moving to another facility as this was an unforeseen change.&#xA0;</span></p>
<p><b>Engaging with third parties:</b><span style="font-weight: 400"> We have initiated discussions with our IT contractors and third-party providers to find potential alternatives, including other location facilities and donations of funds to support this move.&#xA0;</span></p>
<p><b>Options we are considering:</b></p>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">Move our current hardware to a different co-location.&#xA0;</span>
<ul>
<li style="font-weight: 400"><span style="font-weight: 400">This could be another provider, a member of the Advisory Board, a University, or a similar organization that offers services for Open Source projects.</span></li>
<li style="font-weight: 400"><span style="font-weight: 400">This could include moving all the infrastructure, or just part of it, depending on costs and space available at the destination.</span></li>
</ul>
</li>
<li style="font-weight: 400"><span style="font-weight: 400">Abandon our hardware, and either re-create OSSTest from scratch at a different location or switch to a different test system (Gitlab CI).</span></li>
</ul>
<p><b>All options have risks associated.</b></p>
<p><span style="font-weight: 400">Further Considerations:</span></p>
<p><span style="font-weight: 400">Moving the current hardware is expensive, even to a location provided for free.&#xA0; It is unknown whether our hardware will survive the move, or if we will be able to recreate the setup at the new location. Furthermore, our current IT contractors who help us manage the facility can only serve the Boston area which means we will need to factor this in when choosing a new location.</span></p>
<p><span style="font-weight: 400">Our technical leadership team has considered abandoning our infrastructure and creating a new OSSTest instance, however, as it involves acquiring new hardware there is no guarantee we will be able to set up the new instance successfully.</span></p>
<p><span style="font-weight: 400">An option to mitigate this risk could be to deploy on a metal-as-a-service provider, but that would require changes to OSSTest.</span></p>
<p><span style="font-weight: 400">As a last resort, abandoning OSSTest has been discussed.&#xA0; The project has no replacement for a test coverage similar to what OSSTest provides.&#xA0; Even if Gitlab CI expanded test coverage similar to what OSSTest currently covers, some features are unlikely to be replicated: automatic bisections on regressions and testing of external projects (Linux kernel, QEMU, OVMF&#x2026;).</span></p>
<p><span style="font-weight: 400">Input from the community</span></p>
<p><span style="font-weight: 400">While we work on identifying different options, there are a few steps you can take to stay informed.</span></p>
<p><b>Stay Updated: </b><span style="font-weight: 400">Keep an eye on our official communication channels for real-time updates and information about the status of our services.</span></p>
<p><b>Get involved: </b><span style="font-weight: 400">We appreciate you may have feedback and questions, which is why you are welcome to join the next monthly community call (Thursday 11th July 2024) to provide your input.</span></p>
<p><b>Assistance:</b><span style="font-weight: 400"> We welcome members of our community to provide resources or suggest ideas that may help our project.&#xA0;</span></p>
<p><span style="font-weight: 400">Looking Ahead</span></p>
<p><span style="font-weight: 400">Our goal is to identify and implement measures that will minimize the impact on our project. We will carefully consider the feasibility of solutions, budget constraints, and the long-term needs of the Xen Project.</span></p>
<p><span style="font-weight: 400">We apologize for the inconvenience caused by this unexpected announcement and appreciate your understanding and patience as we navigate this challenging situation. Your trust and continued support are invaluable to us, and we remain committed to developing a powerful and reliable open-source hypervisor.</span></p>
<p><span style="font-weight: 400">Sincerely,</span></p>
<p><span style="font-weight: 400">Kelly&#xA0;</span></p>
<p><span style="font-weight: 400">Xen Project Community Manager</span></p>
<p dir="ltr">Update (12th July): The colo houses OSSTest which is a complex custom tool in Xen Project. After many years, it could be said that some machines are slightly outdated, but at the time of creation, it was very useful and has helped developers work on the code. As a community, we are now looking to shift CI and test efforts to options such as GitLab.</p>

<!--kg-card-end: html-->
]]></content:encoded></item><item><title><![CDATA[Xen Summit Talks Now Live on YouTube!]]></title><description><![CDATA[<!--kg-card-begin: html-->
<h5>Hello Xen Community!</h5>
<p>We have some thrilling news to share with you all. The highly anticipated talks from this year&#x2019;s Xen Summit are now live on YouTube! Whether you attended the summit in person or couldn&#x2019;t make it this time, you can now access all the</p>]]></description><link>https://xenproject.org/blog/xen-summit-talks-now-live-on-youtube/</link><guid isPermaLink="false">66f3de4272d3ac07b46d9c03</guid><dc:creator><![CDATA[Kelly Choi]]></dc:creator><pubDate>Tue, 18 Jun 2024 09:22:52 GMT</pubDate><content:encoded><![CDATA[
<!--kg-card-begin: html-->
<h5>Hello Xen Community!</h5>
<p>We have some thrilling news to share with you all. The highly anticipated talks from this year&#x2019;s Xen Summit are now live on YouTube! Whether you attended the summit in person or couldn&#x2019;t make it this time, you can now access all the insightful presentations and discussions online.</p>
<p><strong>Why You Should Watch the Xen Summit Talks</strong><br>
The Xen Summit gathers experts, developers, and enthusiasts from around the world to discuss the latest advancements and future directions of our Project. This year&#x2019;s summit featured a fantastic lineup of speakers who shared their knowledge on a wide range of topics, including:</p>
<ul>
<li><em>Xen Project 2024 Weather Report, Kelly Choi &#x2013; Community Manager, XenServer</em></li>
<li><em>Xen and the Art of Hypervisor Maintenance &#x2013; Jacus de Beer, General Manager, XenServer</em></li>
<li><em>Unikraft Has Arrived: The Lightweight, Fast, Usable Solution for Cloud Deployments &#x2013; Razvan Deaconescu &amp; Andrei Stan, Unikraft</em></li>
<li><em>Next Generation Xen Architecture for Automotive &#x2013; Stefano Stabellini, AMD</em></li>
<li><em>Open Source Safety Elements &#x2013; Out of Context? &#x2013; Nicole Pappler, AlektoMetis</em></li>
</ul>
<p>With so many new features and updates, discover and learn something new today!</p>
<p><strong>How to Access the Talks</strong><br>
All the talks are conveniently organized into a <a href="https://www.youtube.com/playlist?list=PLQMQQsKgvLntZiKoELFs22Mtk-tBNNOMJ&amp;ref=xenproject.org">playlist on our YouTube channel</a>.</p>
<p>We encourage you to subscribe to our channel and hit the notification bell to stay updated with the latest uploads and Xen Project news.</p>
<p><strong>Join the Conversation</strong><br>
We would love to hear your thoughts and feedback on the talks. Feel free to leave comments on the videos, join discussions on <a href="https://matrix.to/?ref=xenproject.org#/#XenProject:matrix.org">Matrix</a>, and share your favorite talks on social media using the hashtag #XenProjectSummit.</p>
<p>Thank you for being a part of the Xen community. We hope you find these talks as inspiring and informative as we do.</p>
<p>Happy watching!</p>

<!--kg-card-end: html-->
]]></content:encoded></item><item><title><![CDATA[Get ready for Xen Summit 2024!]]></title><description><![CDATA[<!--kg-card-begin: html-->
<h3>With less than 2 weeks to go, are you ready?</h3>
<p>The Xen Project is gearing up for a summit full of discussions, collaboration and innovation.</p>
<p>If you haven&#x2019;t already done so &#x2013; get involved by <a href="https://design-sessions.xenproject.org/?ref=xenproject.org">submitting a design session topic.</a></p>
<p>Don&#x2019;t worry if you can&#x2019;</p>]]></description><link>https://xenproject.org/blog/get-ready-for-xen-summit-2024/</link><guid isPermaLink="false">66f3de4272d3ac07b46d9c02</guid><dc:creator><![CDATA[Kelly Choi]]></dc:creator><pubDate>Fri, 24 May 2024 03:46:34 GMT</pubDate><content:encoded><![CDATA[
<!--kg-card-begin: html-->
<h3>With less than 2 weeks to go, are you ready?</h3>
<p>The Xen Project is gearing up for a summit full of discussions, collaboration and innovation.</p>
<p>If you haven&#x2019;t already done so &#x2013; get involved by <a href="https://design-sessions.xenproject.org/?ref=xenproject.org">submitting a design session topic.</a></p>
<p>Don&#x2019;t worry if you can&#x2019;t attend in person, we&#x2019;re going to have a <strong>FREE virtual element for our attendees.&#xA0;</strong></p>
<p>This will be hosted by the community via Jitsi and is free to join! Listen in to talks, or ask questions too.</p>
<p>Please subscribe to our mailing lists to find out more, or alternatively join our <a href="https://matrix.to/?ref=xenproject.org#/#xen-project-summit:matrix.org">Matrix channels</a> where the links will be shared.</p>
<p>&#xA0;</p>
<p>See you there!</p>
<p>Kelly</p>
<p>Community Manager</p>

<!--kg-card-end: html-->
]]></content:encoded></item><item><title><![CDATA[Get involved: Xen Summit 2024 Design Sessions]]></title><description><![CDATA[<!--kg-card-begin: html-->
<h3><strong>Our design sessions are now open for Xen Summit!&#xA0;</strong></h3>
<p>If you&#x2019;ve attended Xen Summit before, you might be familiar with the process.</p>
<p>For anyone who hasn&#x2019;t done so before, please follow the instructions below, using the&#xA0;<a href="https://design-sessions.xenproject.org/?ref=xenproject.org" data-saferedirecturl="https://www.google.com/url?q=https://design-sessions.xenproject.org/&amp;source=gmail&amp;ust=1715423150956000&amp;usg=AOvVaw3r9zmLXYBTVue58DYvt_w7">link to create an account</a>.</p>
<p>Once you&#x2019;</p>]]></description><link>https://xenproject.org/blog/get-involved-xen-summit-2024-design-sessions/</link><guid isPermaLink="false">66f3de4272d3ac07b46d9c01</guid><dc:creator><![CDATA[Kelly Choi]]></dc:creator><pubDate>Fri, 10 May 2024 06:56:17 GMT</pubDate><content:encoded><![CDATA[
<!--kg-card-begin: html-->
<h3><strong>Our design sessions are now open for Xen Summit!&#xA0;</strong></h3>
<p>If you&#x2019;ve attended Xen Summit before, you might be familiar with the process.</p>
<p>For anyone who hasn&#x2019;t done so before, please follow the instructions below, using the&#xA0;<a href="https://design-sessions.xenproject.org/?ref=xenproject.org" data-saferedirecturl="https://www.google.com/url?q=https://design-sessions.xenproject.org/&amp;source=gmail&amp;ust=1715423150956000&amp;usg=AOvVaw3r9zmLXYBTVue58DYvt_w7">link to create an account</a>.</p>
<p>Once you&#x2019;ve created your account, you&#x2019;ll be asked to verify using the code (sent on the mailing list). That&#x2019;s it, you&#x2019;re in!</p>
<p>We aim to have design sessions with a virtual element (using Jitsi/Zoom). This is free for the community to join in and listen, and will be hosted by an attendee in the session.</p>
<p>&#xA0;</p>
<p>If you&#x2019;re going to be an&#xA0;<strong><em>in-person attendee</em></strong>, you can propose a session and vote on sessions you would like to see discussed.</p>
<p>If you&#x2019;re going to be a&#xA0;<strong><em>virtual attendee</em></strong>, you can vote on sessions you would like to see discussed. You can still propose a session, but please note there will be no professional audio or visual equipment in person for these sessions.</p>
<p>The final schedule will be allocated and arranged by the highest-voted sessions.</p>
<p>Virtual links for the community to join Xen Summit design sessions will be shared closer to the event.</p>
<p>For in-person tickets,&#xA0;<a href="https://events.linuxfoundation.org/xen-project-summit/register/?ref=xenproject.org" data-saferedirecturl="https://www.google.com/url?q=https://events.linuxfoundation.org/xen-project-summit/register/&amp;source=gmail&amp;ust=1715423150956000&amp;usg=AOvVaw3l7_WF6CMvN4Iq4okimHsE">click here</a>.</p>
<p>&#xA0;</p>
<h4>Instructions:</h4>
<ul>
<li>Anyone interested can propose a topic.</li>
<li>All participants review the list of sessions, indicating their interest in attending each one.</li>
<li>The session scheduler optimizes the schedule to accommodate as many preferences as possible.</li>
<li>Participants can also propose long-form talks by adding [TALK] to the session title.</li>
</ul>
<p>For suggested topics, sample Design Session submissions, and more tips check out the <a href="https://events.linuxfoundation.org/xen-project-summit/program/design-sessions/?ref=xenproject.org">Xen Design Session page</a> for more information.</p>
<p>&#xA0;</p>
<p>See you there!</p>
<p>Kelly</p>
<p>Community Manager</p>

<!--kg-card-end: html-->
]]></content:encoded></item><item><title><![CDATA[Why is Open Source important? Hear from our community member.]]></title><description><![CDATA[<!--kg-card-begin: html-->
<h3><strong>Community is everything at The Xen Project.</strong></h3>
<p>We spoke to Ayan, a dedicated community member who has been working on the Xen Project on his experience.</p>
<h4 class="p1"><b>Why do you think open source is important?&#xA0;</b></h4>
<p class="p2">Open source software (like Linux kernel, uboot, xen, trusted firmware, etc) is an integral part</p>]]></description><link>https://xenproject.org/blog/why-is-open-source-important-hear-from-our-community-member/</link><guid isPermaLink="false">66f3de4272d3ac07b46d9c00</guid><dc:creator><![CDATA[Kelly Choi]]></dc:creator><pubDate>Fri, 26 Apr 2024 08:23:12 GMT</pubDate><content:encoded><![CDATA[
<!--kg-card-begin: html-->
<h3><strong>Community is everything at The Xen Project.</strong></h3>
<p>We spoke to Ayan, a dedicated community member who has been working on the Xen Project on his experience.</p>
<h4 class="p1"><b>Why do you think open source is important?&#xA0;</b></h4>
<p class="p2">Open source software (like Linux kernel, uboot, xen, trusted firmware, etc) is an integral part of the Petalinux BSP (which is based on Yocto) and I use this for my job, which is important.</p>
<h4 class="p1"><b>Why Xen?</b></h4>
<p class="p2">We use Xen as an example hypervisor to illustrate how to host different VMs on the same SoC. The key features of Xen (ie dom0less, static partitioning) help us to use it to partition and isolate the hardware resources. We use Xen&#x2019;s passthrough mechanism to assign devices to specific VMs.</p>
<h4 class="p2">What does contributing mean to you?</h4>
<p class="p2">Being an active contributor to the Xen project helps us to add new features in the upstream Xen which enables our SoCs to be used across a wide range of customers. For eg VirtIO, PCI passthrough, MPU support, and S3 suspend/resume are some of the ongoing features which should enable Xen to be widely used in the automotive and industrial domains.</p>
<p class="p2">The core aspect of Xen being open source means anyone will be able to use these latest features and can keep track of ongoing development. Besides, it gives an assurance of the quality of the software.</p>
<p class="p2">The advantage of upstreaming features is that your code will be tested on a daily basis and the community will help if they encounter some issues.</p>
<h5>Our community is a welcoming place for all, so we encourage you to join the discussion.</h5>
<h5>Get involved today, by joining the conversation on <a href="https://matrix.to/?ref=xenproject.org#/#XenProject:matrix.org">Matrix here</a></h5>

<!--kg-card-end: html-->
]]></content:encoded></item></channel></rss>