On 26.09.2025 06:41, Penny, Zheng wrote:
>> -Original Message-
>> From: Jan Beulich
>> Sent: Thursday, September 25, 2025 10:29 PM
>>
>> On 25.09.2025 11:41, Penny, Zheng wrote:
-Original Message-
From: Jan Beulich
Sent: Thursday, September 11, 2025 9:30 PM
>>>
On 25.09.2025 20:37, Dmytro Prokopchuk1 wrote:
> On 9/25/25 16:25, Jan Beulich wrote:
>> On 25.09.2025 10:04, Dmytro Prokopchuk1 wrote:
>>> --- a/docs/misra/deviations.rst
>>> +++ b/docs/misra/deviations.rst
>>> @@ -366,11 +366,22 @@ Deviations related to MISRA C:2012 Rules:
>>>- Tagged as
On 26.09.25 07:49, Jan Beulich wrote:
On 25.09.2025 22:22, Oleksii Kurochko wrote:
On 9/25/25 8:26 AM, Jan Beulich wrote:
On 24.09.2025 11:36, Oleksii Kurochko wrote:
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -14,6 +14,7 @@ The format is based on [Keep a
Changelog](https://keepachangelog.com/e
On 26.09.2025 08:32, Sergiy Kibrik wrote:
> 06.09.25 01:01, Daniel P. Smith:
>> On 9/2/25 05:41, Jan Beulich wrote:
>>> On 01.09.2025 12:52, Sergiy Kibrik wrote:
--- a/xen/common/Kconfig
+++ b/xen/common/Kconfig
@@ -418,6 +418,17 @@ config XSM_FLASK_AVC_STATS
If uns
On 25.09.2025 21:56, Grygorii Strashko wrote:
> From: Grygorii Strashko
>
> According to the commit b66e28226dd9 ("x86/mem_sharing: gate enabling on
> cpu_has_vmx") the Xen memory sharing support is only possible on platforms
> with "Intel VT-x" (INTEL_VMX=y) enabled.
> The same commit is also ad
On 25.09.2025 22:22, Oleksii Kurochko wrote:
> On 9/25/25 8:26 AM, Jan Beulich wrote:
>> On 24.09.2025 11:36, Oleksii Kurochko wrote:
>>> --- a/CHANGELOG.md
>>> +++ b/CHANGELOG.md
>>> @@ -14,6 +14,7 @@ The format is based on [Keep a
>>> Changelog](https://keepachangelog.com/en/1.0.0/)
>>>- Deb
[Public]
> -Original Message-
> From: Jan Beulich
> Sent: Thursday, September 25, 2025 10:29 PM
> To: Penny, Zheng
> Cc: Huang, Ray ; Daniel P. Smith
> ; xen-devel@lists.xenproject.org; Andryuk, Jason
> ; Stabellini, Stefano
> Subject: Re: [PATCH v2 18/26] xen/domctl: wrap xsm_getdomain
On 9/19/25 11:26 PM, Jan Beulich wrote:
On 17.09.2025 23:55, Oleksii Kurochko wrote:
@@ -151,6 +152,8 @@ void __init noreturn start_xen(unsigned long bootcpu_id,
gstage_mode_detect();
+vmid_init();
Like for the earlier patch, I'm not convinced this is a function good
to call fr
On Thu, Sep 11, 2025 at 07:20:33PM +0200, Alejandro Vallejo wrote:
> On Thu Sep 11, 2025 at 10:24 AM CEST, Gerald Elder-Vass wrote:
> > Commit 59a1d6d3ea1e introduced Shim's LoadImage protocol and unloads the
> > image after loading it (for verification purposes) regardless of the
> > returned stat
On 9/25/25 10:11 AM, Roger Pau Monné wrote:
On Thu, Sep 25, 2025 at 09:41:43AM +0200, Jan Beulich wrote:
On 25.09.2025 09:40, Roger Pau Monné wrote:
On Thu, Sep 25, 2025 at 09:37:46AM +0200, Jan Beulich wrote:
On 25.09.2025 09:34, Roger Pau Monné wrote:
On Thu, Sep 25, 2025 at 09:03:06AM +02
On Thu, Sep 11, 2025 at 08:24:27AM +, Gerald Elder-Vass wrote:
> Commit cb41b4ce14a9 introduced init_secure_boot_mode but one line was
> not wrapped appropriately.
>
> Signed-off-by: Gerald Elder-Vass
Acked-by: Marek Marczykowski-Górecki
> ---
> CC: Marek Marczykowski-Górecki
> CC: "Danie
On Tue Sep 16, 2025 at 7:14 PM CEST, Andrew Cooper wrote:
> On 16/09/2025 9:57 am, Grygorii Strashko wrote:
>> Hi Jan,
>>
>> On 16.09.25 17:34, Jan Beulich wrote:
>>> On 16.09.2025 12:32, Grygorii Strashko wrote:
From: Grygorii Strashko
Since commit b99227347230 ("x86: Fix AMD_SVM a
On 9/25/25 9:36 AM, Jan Beulich wrote:
On 16.04.2025 11:00, Jan Beulich wrote:
By observation GNU ld 2.25 may emit file symbols for .data.read_mostly
when linking xen.efi. Due to the nature of file symbols in COFF symbol
tables (see the code comment) the symbols_offsets[] entries for such
symbo
On 9/25/25 8:26 AM, Jan Beulich wrote:
On 24.09.2025 11:36, Oleksii Kurochko wrote:
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -14,6 +14,7 @@ The format is based on [Keep a
Changelog](https://keepachangelog.com/en/1.0.0/)
- Debian Trixie added to CI. Debian Bullseye retired from CI for RISC-
From: Grygorii Strashko
The LAPIC LVTx registers have two RO bits:
- all: Delivery Status (DS) bit 12
- LINT0/LINT1: Remote IRR Flag (RIR) bit 14.
This bit is reserved for other LVTx regs with RAZ/WI access type (MMIO), while
WRMSR (guest_wrmsr_x2apic()) has appropiate checks for reserved bit
From: Grygorii Strashko
According to the commit b66e28226dd9 ("x86/mem_sharing: gate enabling on
cpu_has_vmx") the Xen memory sharing support is only possible on platforms
with "Intel VT-x" (INTEL_VMX=y) enabled.
The same commit is also added runtime check for "cpu_has_vmx" in
mem_sharing_control
On 8/25/25 13:23, Jan Beulich wrote:
> On 24.08.2025 19:27, Dmytro Prokopchuk1 wrote:
>> MISRA C Rule 11.3 states: "A cast shall not be performed between a pointer
>> to object type and a pointer to a different object type."
>>
>> Violations of this rule arise due to the 'container_of()' macro, w
On 24/09/2025 16:48, Grygorii Strashko wrote:
Hi Ayan,
Hi Grygorii,
On 22.09.25 19:55, Ayan Kumar Halder wrote:
On 16/09/2025 11:55, Grygorii Strashko wrote:
Hi Ayan,
Hi Grygorii,
On 12.09.25 20:00, Ayan Kumar Halder wrote:
Introduce CONFIG_GICV3_SELFTEST to enclose tests for GICv3 dr
On 9/25/25 16:25, Jan Beulich wrote:
> On 25.09.2025 10:04, Dmytro Prokopchuk1 wrote:
>> --- a/docs/misra/deviations.rst
>> +++ b/docs/misra/deviations.rst
>> @@ -366,11 +366,22 @@ Deviations related to MISRA C:2012 Rules:
>>- Tagged as `safe` for ECLAIR.
>>
>> * - R11.1
>> -
Along with Zen2 (which doesn't expose ERMS), both families reportedly
suffer from sub-optimal aliasing detection when deciding whether REP MOVSB
can actually be carried out the accelerated way. Therefore we want to
avoid its use in the common case (memset(), copy_page_hot()).
Reported-by: Andrew C
On 25.09.2025 16:56, Oleksii Moisieiev wrote:
> This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to
> allow for building Xen without support for booting a regular domain (Dom0).
> This functionality is primarily intended for the ARM architecture.
>
> A new Kconfig symbol, `HAS_DOM0
[Public]
> -Original Message-
> From: Jan Beulich
> Sent: Thursday, September 11, 2025 9:30 PM
> To: Penny, Zheng
> Cc: Huang, Ray ; Daniel P. Smith
> ; xen-devel@lists.xenproject.org
> Subject: Re: [PATCH v2 18/26] xen/domctl: wrap xsm_getdomaininfo() with
> CONFIG_MGMT_HYPERCALLS
>
> O
On 24.09.2025 13:23, Alejandro Vallejo wrote:
> On Tue Sep 16, 2025 at 7:14 PM CEST, Andrew Cooper wrote:
>> On 16/09/2025 9:57 am, Grygorii Strashko wrote:
>>> Hi Jan,
>>>
>>> On 16.09.25 17:34, Jan Beulich wrote:
On 16.09.2025 12:32, Grygorii Strashko wrote:
> From: Grygorii Strashko
>>
This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to
allow for building Xen without support for booting a regular domain (Dom0).
This functionality is primarily intended for the ARM architecture.
A new Kconfig symbol, `HAS_DOM0`, has been added and is selected by
default for ARM and
On 25.09.2025 11:41, Penny, Zheng wrote:
> [Public]
>
>> -Original Message-
>> From: Jan Beulich
>> Sent: Thursday, September 11, 2025 9:30 PM
>> To: Penny, Zheng
>> Cc: Huang, Ray ; Daniel P. Smith
>> ; xen-devel@lists.xenproject.org
>> Subject: Re: [PATCH v2 18/26] xen/domctl: wrap xsm
On 24.09.2025 17:40, Oleksii Kurochko wrote:
>
> On 9/20/25 12:14 AM, Jan Beulich wrote:
>> On 17.09.2025 23:55, Oleksii Kurochko wrote:
>>
>>> +{
>>> +return MASK_INSR(mfn_x(page_to_mfn(p2m->root)), HGATP_PPN) |
>>> + MASK_INSR(gstage_mode, HGATP_MODE_MASK) |
>>> + MASK_IN
On 24.09.2025 16:25, Oleksii Kurochko wrote:
>
> On 9/19/25 11:26 PM, Jan Beulich wrote:
>> On 17.09.2025 23:55, Oleksii Kurochko wrote:
>>> @@ -151,6 +152,8 @@ void __init noreturn start_xen(unsigned long bootcpu_id,
>>>
>>> gstage_mode_detect();
>>>
>>> +vmid_init();
>> Like for
On 24.09.2025 17:00, Oleksii Kurochko wrote:
>
> On 9/24/25 1:31 PM, Oleksii Kurochko wrote:
--- a/xen/arch/riscv/setup.c
+++ b/xen/arch/riscv/setup.c
@@ -22,6 +22,7 @@
#include
#include
#include
+#include
#include
#include
#inclu
On 25.09.2025 10:04, Dmytro Prokopchuk1 wrote:
> --- a/docs/misra/deviations.rst
> +++ b/docs/misra/deviations.rst
> @@ -366,11 +366,22 @@ Deviations related to MISRA C:2012 Rules:
> - Tagged as `safe` for ECLAIR.
>
> * - R11.1
> - - The conversion from a function pointer to unsigne
On 24.09.2025 09:59, Mykyta Poturai wrote:
> --- a/xen/arch/x86/include/asm/pci.h
> +++ b/xen/arch/x86/include/asm/pci.h
> @@ -76,4 +76,10 @@ int pci_sanitize_bar_memory(struct rangeset *r);
>
> void pci_setup(void);
>
> +/* Unlike ARM, HW domain does not ever use vpci for x86 */
What did you
On 23.09.2025 06:38, Penny Zheng wrote:
> --- a/xen/include/acpi/cpufreq/cpufreq.h
> +++ b/xen/include/acpi/cpufreq/cpufreq.h
> @@ -294,4 +294,16 @@ int acpi_cpufreq_register(void);
> int amd_cppc_cmdline_parse(const char *s, const char *e);
> int amd_cppc_register_driver(void);
>
> +/*
> + * G
On 25/09/2025 12:22, Grygorii Strashko wrote:
>
>
> On 24.09.25 19:00, Oleksii Moisieiev wrote:
>> This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to
>> allow for building Xen without support for booting a regular domain
>> (Dom0).
>> This functionality is primarily intended for
On 25.09.25 13:53, Oleksii Moisieiev wrote:
On 25/09/2025 12:22, Grygorii Strashko wrote:
On 24.09.25 19:00, Oleksii Moisieiev wrote:
This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to
allow for building Xen without support for booting a regular domain
(Dom0).
This funct
While adding new enumerators one may overlook the (rare) need to bump
X86_NR_{SYNTH,BUG}. Guard against that happening by adding respective
checking. The use of BUILD_BUG_ON_ZERO(), however, entails a number of
other changes, as the expansion may not appear in the assembly produced.
Furthermore inp
Patch 1 is definitely intended for 4.21, to limit possible performance fallout
from the ERMS series. Patch 2 may be too intrusive to consider taking at this
point.
1: x86/AMD: avoid REP MOVSB for Zen3/4
2: x86: guard synthetic feature and bug enumerators
Jan
On 25.09.2025 10:14, Oleksii Moisieiev wrote:
>
>
> On 25/09/2025 09:34, Jan Beulich wrote:
>> On 24.09.2025 18:00, Oleksii Moisieiev wrote:
>>> --- a/xen/common/Kconfig
>>> +++ b/xen/common/Kconfig
>>> @@ -26,6 +26,14 @@ config DOM0LESS_BOOT
>>> Xen boot without the need of a control domai
On 24.09.25 19:00, Oleksii Moisieiev wrote:
This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to
allow for building Xen without support for booting a regular domain (Dom0).
This functionality is primarily intended for the ARM architecture.
A new Kconfig symbol, `HAS_DOM0`, has
On 23.09.25 21:38, Julien Grall wrote:
Hi Grygorii,
On 23/09/2025 17:09, Grygorii Strashko wrote:
On 18.09.25 15:16, Mykyta Poturai wrote:
This series implements support for CPU hotplug/unplug on Arm. To achieve this,
several things need to be done:
1. XEN_SYSCTL_CPU_HOTPLUG_* calls implem
On 25/09/2025 09:34, Jan Beulich wrote:
> On 24.09.2025 18:00, Oleksii Moisieiev wrote:
>> --- a/xen/common/Kconfig
>> +++ b/xen/common/Kconfig
>> @@ -26,6 +26,14 @@ config DOM0LESS_BOOT
>>Xen boot without the need of a control domain (Dom0), which could be
>>present anyway.
>>
On Thu, Sep 25, 2025 at 09:41:43AM +0200, Jan Beulich wrote:
> On 25.09.2025 09:40, Roger Pau Monné wrote:
> > On Thu, Sep 25, 2025 at 09:37:46AM +0200, Jan Beulich wrote:
> >> On 25.09.2025 09:34, Roger Pau Monné wrote:
> >>> On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote:
> On 2
[Public]
> -Original Message-
> From: Jan Beulich
> Sent: Thursday, September 11, 2025 7:34 PM
> To: Penny, Zheng
> Cc: xen-devel@lists.xenproject.org; Huang, Ray ; Daniel
> P. Smith ; Stefano Stabellini
>
> Subject: Re: [PATCH v2 17/26] xen/domctl: wrap xsm_set_target() with
> CONFIG_M
[Public]
> -Original Message-
> From: Jan Beulich
> Sent: Thursday, September 11, 2025 7:28 PM
> To: Penny, Zheng ; Stefano Stabellini
>
> Cc: Huang, Ray ; Julien Grall ; Bertrand
> Marquis ; Orzel, Michal ;
> Volodymyr Babchuk ; Andrew Cooper
> ; Anthony PERARD ;
> Roger Pau Monné ; xen
On 25.09.2025 09:40, Roger Pau Monné wrote:
> On Thu, Sep 25, 2025 at 09:37:46AM +0200, Jan Beulich wrote:
>> On 25.09.2025 09:34, Roger Pau Monné wrote:
>>> On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote:
On 24.09.2025 15:40, Roger Pau Monné wrote:
> On Wed, Sep 24, 2025 at 1
On 14.07.2025 09:26, Jan Beulich wrote:
> On 12.07.2025 12:37, Julien Grall wrote:
>> On 03/07/2025 11:04, Jan Beulich wrote:
>>> On 03.07.2025 10:52, Julien Grall wrote:
On 02/07/2025 14:37, Jan Beulich wrote:
> On 02.07.2025 15:18, Julien Grall wrote:
>> On 02/07/2025 14:06, Jan Beul
On Thu, Sep 25, 2025 at 09:37:46AM +0200, Jan Beulich wrote:
> On 25.09.2025 09:34, Roger Pau Monné wrote:
> > On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote:
> >> On 24.09.2025 15:40, Roger Pau Monné wrote:
> >>> On Wed, Sep 24, 2025 at 11:50:02AM +, Andrew Cooper wrote:
> On
On 25.09.2025 09:34, Roger Pau Monné wrote:
> On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote:
>> On 24.09.2025 15:40, Roger Pau Monné wrote:
>>> On Wed, Sep 24, 2025 at 11:50:02AM +, Andrew Cooper wrote:
On 24/09/2025 4:00 am, Roger Pau Monne wrote:
> Otherwise the check f
On 16.04.2025 11:00, Jan Beulich wrote:
> By observation GNU ld 2.25 may emit file symbols for .data.read_mostly
> when linking xen.efi. Due to the nature of file symbols in COFF symbol
> tables (see the code comment) the symbols_offsets[] entries for such
> symbols would cause assembler warnings r
On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote:
> On 24.09.2025 15:40, Roger Pau Monné wrote:
> > On Wed, Sep 24, 2025 at 11:50:02AM +, Andrew Cooper wrote:
> >> On 24/09/2025 4:00 am, Roger Pau Monne wrote:
> >>> Otherwise the check for the SS feature in
> >>> check_memory_type_se
On 11.09.2025 10:24, Gerald Elder-Vass wrote:
> A previous series for supporting Shim's LoadImage protocol had some
> outstanding comments after it had been accepted, and internal review
> revealed an improvement to be safe when unloading the image.
>
> This patch series includes those changes.
>
On 24.09.2025 15:40, Roger Pau Monné wrote:
> On Wed, Sep 24, 2025 at 11:50:02AM +, Andrew Cooper wrote:
>> On 24/09/2025 4:00 am, Roger Pau Monne wrote:
>>> Otherwise the check for the SS feature in
>>> check_memory_type_self_snoop_errata() fails unconditionally, which leads to
>>> X86_FEATURE
50 matches
Mail list logo