Re: [PATCH v2 18/26] xen/domctl: wrap xsm_getdomaininfo() with CONFIG_MGMT_HYPERCALLS

2025-09-25 Thread Jan Beulich
On 26.09.2025 06:41, Penny, Zheng wrote: >> -Original Message- >> From: Jan Beulich >> Sent: Thursday, September 25, 2025 10:29 PM >> >> On 25.09.2025 11:41, Penny, Zheng wrote: -Original Message- From: Jan Beulich Sent: Thursday, September 11, 2025 9:30 PM >>>

Re: [PATCH v2] misra: consider conversion from UL or (void*) to function pointer as safe

2025-09-25 Thread Jan Beulich
On 25.09.2025 20:37, Dmytro Prokopchuk1 wrote: > On 9/25/25 16:25, Jan Beulich wrote: >> On 25.09.2025 10:04, Dmytro Prokopchuk1 wrote: >>> --- a/docs/misra/deviations.rst >>> +++ b/docs/misra/deviations.rst >>> @@ -366,11 +366,22 @@ Deviations related to MISRA C:2012 Rules: >>>- Tagged as

Re: [PATCH] CHANGELOG.md: Update for 4.21 release cycle

2025-09-25 Thread Juergen Gross
On 26.09.25 07:49, Jan Beulich wrote: On 25.09.2025 22:22, Oleksii Kurochko wrote: On 9/25/25 8:26 AM, Jan Beulich wrote: On 24.09.2025 11:36, Oleksii Kurochko wrote: --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -14,6 +14,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/e

Re: [XEN PATCH v2] xen/flask: limit sidtable size

2025-09-25 Thread Jan Beulich
On 26.09.2025 08:32, Sergiy Kibrik wrote: > 06.09.25 01:01, Daniel P. Smith: >> On 9/2/25 05:41, Jan Beulich wrote: >>> On 01.09.2025 12:52, Sergiy Kibrik wrote: --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -418,6 +418,17 @@ config XSM_FLASK_AVC_STATS If uns

Re: [XEN][PATCH] x86/hvm: mem_sharing: add dependency from CONFIG_INTEL_VMX

2025-09-25 Thread Jan Beulich
On 25.09.2025 21:56, Grygorii Strashko wrote: > From: Grygorii Strashko > > According to the commit b66e28226dd9 ("x86/mem_sharing: gate enabling on > cpu_has_vmx") the Xen memory sharing support is only possible on platforms > with "Intel VT-x" (INTEL_VMX=y) enabled. > The same commit is also ad

Re: [PATCH] CHANGELOG.md: Update for 4.21 release cycle

2025-09-25 Thread Jan Beulich
On 25.09.2025 22:22, Oleksii Kurochko wrote: > On 9/25/25 8:26 AM, Jan Beulich wrote: >> On 24.09.2025 11:36, Oleksii Kurochko wrote: >>> --- a/CHANGELOG.md >>> +++ b/CHANGELOG.md >>> @@ -14,6 +14,7 @@ The format is based on [Keep a >>> Changelog](https://keepachangelog.com/en/1.0.0/) >>>- Deb

RE: [PATCH v2 18/26] xen/domctl: wrap xsm_getdomaininfo() with CONFIG_MGMT_HYPERCALLS

2025-09-25 Thread Penny, Zheng
[Public] > -Original Message- > From: Jan Beulich > Sent: Thursday, September 25, 2025 10:29 PM > To: Penny, Zheng > Cc: Huang, Ray ; Daniel P. Smith > ; xen-devel@lists.xenproject.org; Andryuk, Jason > ; Stabellini, Stefano > Subject: Re: [PATCH v2 18/26] xen/domctl: wrap xsm_getdomain

Re: [PATCH v4 02/18] xen/riscv: introduce VMID allocation and manegement

2025-09-25 Thread Oleksii Kurochko
On 9/19/25 11:26 PM, Jan Beulich wrote: On 17.09.2025 23:55, Oleksii Kurochko wrote: @@ -151,6 +152,8 @@ void __init noreturn start_xen(unsigned long bootcpu_id, gstage_mode_detect(); +vmid_init(); Like for the earlier patch, I'm not convinced this is a function good to call fr

Re: [PATCH 2/3] efi: Protect against unnecessary image unloading

2025-09-25 Thread Marek Marczykowski-Górecki
On Thu, Sep 11, 2025 at 07:20:33PM +0200, Alejandro Vallejo wrote: > On Thu Sep 11, 2025 at 10:24 AM CEST, Gerald Elder-Vass wrote: > > Commit 59a1d6d3ea1e introduced Shim's LoadImage protocol and unloads the > > image after loading it (for verification purposes) regardless of the > > returned stat

Re: [PATCH for-4.21] x86/cpu: populate CPUID 0x1.edx features early for self-snoop detection

2025-09-25 Thread Oleksii Kurochko
On 9/25/25 10:11 AM, Roger Pau Monné wrote: On Thu, Sep 25, 2025 at 09:41:43AM +0200, Jan Beulich wrote: On 25.09.2025 09:40, Roger Pau Monné wrote: On Thu, Sep 25, 2025 at 09:37:46AM +0200, Jan Beulich wrote: On 25.09.2025 09:34, Roger Pau Monné wrote: On Thu, Sep 25, 2025 at 09:03:06AM +02

Re: [PATCH 1/3] efi: Fix line length in init_secure_boot_mode

2025-09-25 Thread Marek Marczykowski-Górecki
On Thu, Sep 11, 2025 at 08:24:27AM +, Gerald Elder-Vass wrote: > Commit cb41b4ce14a9 introduced init_secure_boot_mode but one line was > not wrapped appropriately. > > Signed-off-by: Gerald Elder-Vass Acked-by: Marek Marczykowski-Górecki > --- > CC: Marek Marczykowski-Górecki > CC: "Danie

Re: [XEN][PATCH 1/2] x86: hvm: vmx: fix runtime vmx presence check for !CONFIG_INTEL_VMX case

2025-09-25 Thread Alejandro Vallejo
On Tue Sep 16, 2025 at 7:14 PM CEST, Andrew Cooper wrote: > On 16/09/2025 9:57 am, Grygorii Strashko wrote: >> Hi Jan, >> >> On 16.09.25 17:34, Jan Beulich wrote: >>> On 16.09.2025 12:32, Grygorii Strashko wrote: From: Grygorii Strashko Since commit b99227347230 ("x86: Fix AMD_SVM a

Re: Ping: [PATCH] symbols: discard stray file symbols

2025-09-25 Thread Oleksii Kurochko
On 9/25/25 9:36 AM, Jan Beulich wrote: On 16.04.2025 11:00, Jan Beulich wrote: By observation GNU ld 2.25 may emit file symbols for .data.read_mostly when linking xen.efi. Due to the nature of file symbols in COFF symbol tables (see the code comment) the symbols_offsets[] entries for such symbo

Re: [PATCH] CHANGELOG.md: Update for 4.21 release cycle

2025-09-25 Thread Oleksii Kurochko
On 9/25/25 8:26 AM, Jan Beulich wrote: On 24.09.2025 11:36, Oleksii Kurochko wrote: --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -14,6 +14,7 @@ The format is based on [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) - Debian Trixie added to CI. Debian Bullseye retired from CI for RISC-

[XEN][PATCH] x86/hvm: vlapic: fix RO bits emulation in LVTx regs

2025-09-25 Thread Grygorii Strashko
From: Grygorii Strashko The LAPIC LVTx registers have two RO bits: - all: Delivery Status (DS) bit 12 - LINT0/LINT1: Remote IRR Flag (RIR) bit 14. This bit is reserved for other LVTx regs with RAZ/WI access type (MMIO), while WRMSR (guest_wrmsr_x2apic()) has appropiate checks for reserved bit

[XEN][PATCH] x86/hvm: mem_sharing: add dependency from CONFIG_INTEL_VMX

2025-09-25 Thread Grygorii Strashko
From: Grygorii Strashko According to the commit b66e28226dd9 ("x86/mem_sharing: gate enabling on cpu_has_vmx") the Xen memory sharing support is only possible on platforms with "Intel VT-x" (INTEL_VMX=y) enabled. The same commit is also added runtime check for "cpu_has_vmx" in mem_sharing_control

Re: [PATCH v2] misra: add deviation for MISRA C Rule 11.3

2025-09-25 Thread Dmytro Prokopchuk1
On 8/25/25 13:23, Jan Beulich wrote: > On 24.08.2025 19:27, Dmytro Prokopchuk1 wrote: >> MISRA C Rule 11.3 states: "A cast shall not be performed between a pointer >> to object type and a pointer to a different object type." >> >> Violations of this rule arise due to the 'container_of()' macro, w

Re: [RFC PATCH] xen/arm: Introduce GICV3 Self Tests

2025-09-25 Thread Ayan Kumar Halder
On 24/09/2025 16:48, Grygorii Strashko wrote: Hi Ayan, Hi Grygorii, On 22.09.25 19:55, Ayan Kumar Halder wrote: On 16/09/2025 11:55, Grygorii Strashko wrote: Hi Ayan, Hi Grygorii, On 12.09.25 20:00, Ayan Kumar Halder wrote: Introduce CONFIG_GICV3_SELFTEST to enclose tests for GICv3 dr

Re: [PATCH v2] misra: consider conversion from UL or (void*) to function pointer as safe

2025-09-25 Thread Dmytro Prokopchuk1
On 9/25/25 16:25, Jan Beulich wrote: > On 25.09.2025 10:04, Dmytro Prokopchuk1 wrote: >> --- a/docs/misra/deviations.rst >> +++ b/docs/misra/deviations.rst >> @@ -366,11 +366,22 @@ Deviations related to MISRA C:2012 Rules: >>- Tagged as `safe` for ECLAIR. >> >> * - R11.1 >> -

[PATCH for-4.21 1/2] x86/AMD: avoid REP MOVSB for Zen3/4

2025-09-25 Thread Jan Beulich
Along with Zen2 (which doesn't expose ERMS), both families reportedly suffer from sub-optimal aliasing detection when deciding whether REP MOVSB can actually be carried out the accelerated way. Therefore we want to avoid its use in the common case (memset(), copy_page_hot()). Reported-by: Andrew C

Re: [PATCH v4] xen/arm, xen/common: Add Kconfig option to control Dom0 boot

2025-09-25 Thread Jan Beulich
On 25.09.2025 16:56, Oleksii Moisieiev wrote: > This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to > allow for building Xen without support for booting a regular domain (Dom0). > This functionality is primarily intended for the ARM architecture. > > A new Kconfig symbol, `HAS_DOM0

RE: [PATCH v2 18/26] xen/domctl: wrap xsm_getdomaininfo() with CONFIG_MGMT_HYPERCALLS

2025-09-25 Thread Penny, Zheng
[Public] > -Original Message- > From: Jan Beulich > Sent: Thursday, September 11, 2025 9:30 PM > To: Penny, Zheng > Cc: Huang, Ray ; Daniel P. Smith > ; xen-devel@lists.xenproject.org > Subject: Re: [PATCH v2 18/26] xen/domctl: wrap xsm_getdomaininfo() with > CONFIG_MGMT_HYPERCALLS > > O

Re: [XEN][PATCH 1/2] x86: hvm: vmx: fix runtime vmx presence check for !CONFIG_INTEL_VMX case

2025-09-25 Thread Jan Beulich
On 24.09.2025 13:23, Alejandro Vallejo wrote: > On Tue Sep 16, 2025 at 7:14 PM CEST, Andrew Cooper wrote: >> On 16/09/2025 9:57 am, Grygorii Strashko wrote: >>> Hi Jan, >>> >>> On 16.09.25 17:34, Jan Beulich wrote: On 16.09.2025 12:32, Grygorii Strashko wrote: > From: Grygorii Strashko >>

[PATCH v4] xen/arm, xen/common: Add Kconfig option to control Dom0 boot

2025-09-25 Thread Oleksii Moisieiev
This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to allow for building Xen without support for booting a regular domain (Dom0). This functionality is primarily intended for the ARM architecture. A new Kconfig symbol, `HAS_DOM0`, has been added and is selected by default for ARM and

Re: [PATCH v2 18/26] xen/domctl: wrap xsm_getdomaininfo() with CONFIG_MGMT_HYPERCALLS

2025-09-25 Thread Jan Beulich
On 25.09.2025 11:41, Penny, Zheng wrote: > [Public] > >> -Original Message- >> From: Jan Beulich >> Sent: Thursday, September 11, 2025 9:30 PM >> To: Penny, Zheng >> Cc: Huang, Ray ; Daniel P. Smith >> ; xen-devel@lists.xenproject.org >> Subject: Re: [PATCH v2 18/26] xen/domctl: wrap xsm

Re: [PATCH v4 05/18] xen/riscv: add root page table allocation

2025-09-25 Thread Jan Beulich
On 24.09.2025 17:40, Oleksii Kurochko wrote: > > On 9/20/25 12:14 AM, Jan Beulich wrote: >> On 17.09.2025 23:55, Oleksii Kurochko wrote: >> >>> +{ >>> +return MASK_INSR(mfn_x(page_to_mfn(p2m->root)), HGATP_PPN) | >>> + MASK_INSR(gstage_mode, HGATP_MODE_MASK) | >>> + MASK_IN

Re: [PATCH v4 02/18] xen/riscv: introduce VMID allocation and manegement

2025-09-25 Thread Jan Beulich
On 24.09.2025 16:25, Oleksii Kurochko wrote: > > On 9/19/25 11:26 PM, Jan Beulich wrote: >> On 17.09.2025 23:55, Oleksii Kurochko wrote: >>> @@ -151,6 +152,8 @@ void __init noreturn start_xen(unsigned long bootcpu_id, >>> >>> gstage_mode_detect(); >>> >>> +vmid_init(); >> Like for

Re: [PATCH v4 01/18] xen/riscv: detect and initialize G-stage mode

2025-09-25 Thread Jan Beulich
On 24.09.2025 17:00, Oleksii Kurochko wrote: > > On 9/24/25 1:31 PM, Oleksii Kurochko wrote: --- a/xen/arch/riscv/setup.c +++ b/xen/arch/riscv/setup.c @@ -22,6 +22,7 @@ #include #include #include +#include #include #include #inclu

Re: [PATCH v2] misra: consider conversion from UL or (void*) to function pointer as safe

2025-09-25 Thread Jan Beulich
On 25.09.2025 10:04, Dmytro Prokopchuk1 wrote: > --- a/docs/misra/deviations.rst > +++ b/docs/misra/deviations.rst > @@ -366,11 +366,22 @@ Deviations related to MISRA C:2012 Rules: > - Tagged as `safe` for ECLAIR. > > * - R11.1 > - - The conversion from a function pointer to unsigne

Re: [PATCH v1 3/8] xen/pci: update DT for hwdom when it uses vpci

2025-09-25 Thread Jan Beulich
On 24.09.2025 09:59, Mykyta Poturai wrote: > --- a/xen/arch/x86/include/asm/pci.h > +++ b/xen/arch/x86/include/asm/pci.h > @@ -76,4 +76,10 @@ int pci_sanitize_bar_memory(struct rangeset *r); > > void pci_setup(void); > > +/* Unlike ARM, HW domain does not ever use vpci for x86 */ What did you

Re: [PATCH v10 6/8] xen/cpufreq: bypass governor-related para for amd-cppc-epp

2025-09-25 Thread Jan Beulich
On 23.09.2025 06:38, Penny Zheng wrote: > --- a/xen/include/acpi/cpufreq/cpufreq.h > +++ b/xen/include/acpi/cpufreq/cpufreq.h > @@ -294,4 +294,16 @@ int acpi_cpufreq_register(void); > int amd_cppc_cmdline_parse(const char *s, const char *e); > int amd_cppc_register_driver(void); > > +/* > + * G

Re: [PATCH v3] xen/arm, xen/common: Add Kconfig option to control Dom0 boot

2025-09-25 Thread Oleksii Moisieiev
On 25/09/2025 12:22, Grygorii Strashko wrote: > > > On 24.09.25 19:00, Oleksii Moisieiev wrote: >> This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to >> allow for building Xen without support for booting a regular domain >> (Dom0). >> This functionality is primarily intended for

Re: [PATCH v3] xen/arm, xen/common: Add Kconfig option to control Dom0 boot

2025-09-25 Thread Grygorii Strashko
On 25.09.25 13:53, Oleksii Moisieiev wrote: On 25/09/2025 12:22, Grygorii Strashko wrote: On 24.09.25 19:00, Oleksii Moisieiev wrote: This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to allow for building Xen without support for booting a regular domain (Dom0). This funct

[PATCH 2/2] x86: guard synthetic feature and bug enumerators

2025-09-25 Thread Jan Beulich
While adding new enumerators one may overlook the (rare) need to bump X86_NR_{SYNTH,BUG}. Guard against that happening by adding respective checking. The use of BUILD_BUG_ON_ZERO(), however, entails a number of other changes, as the expansion may not appear in the assembly produced. Furthermore inp

[PATCH 0/2] x86: ERMS follow-on

2025-09-25 Thread Jan Beulich
Patch 1 is definitely intended for 4.21, to limit possible performance fallout from the ERMS series. Patch 2 may be too intrusive to consider taking at this point. 1: x86/AMD: avoid REP MOVSB for Zen3/4 2: x86: guard synthetic feature and bug enumerators Jan

Re: [PATCH v3] xen/arm, xen/common: Add Kconfig option to control Dom0 boot

2025-09-25 Thread Jan Beulich
On 25.09.2025 10:14, Oleksii Moisieiev wrote: > > > On 25/09/2025 09:34, Jan Beulich wrote: >> On 24.09.2025 18:00, Oleksii Moisieiev wrote: >>> --- a/xen/common/Kconfig >>> +++ b/xen/common/Kconfig >>> @@ -26,6 +26,14 @@ config DOM0LESS_BOOT >>> Xen boot without the need of a control domai

Re: [PATCH v3] xen/arm, xen/common: Add Kconfig option to control Dom0 boot

2025-09-25 Thread Grygorii Strashko
On 24.09.25 19:00, Oleksii Moisieiev wrote: This commit introduces a new Kconfig option, `CONFIG_DOM0_BOOT`, to allow for building Xen without support for booting a regular domain (Dom0). This functionality is primarily intended for the ARM architecture. A new Kconfig symbol, `HAS_DOM0`, has

Re: [PATCH v1 0/4] Implement CPU hotplug on Arm

2025-09-25 Thread Grygorii Strashko
On 23.09.25 21:38, Julien Grall wrote: Hi Grygorii, On 23/09/2025 17:09, Grygorii Strashko wrote: On 18.09.25 15:16, Mykyta Poturai wrote: This series implements support for CPU hotplug/unplug on Arm. To achieve this, several things need to be done: 1. XEN_SYSCTL_CPU_HOTPLUG_* calls implem

Re: [PATCH v3] xen/arm, xen/common: Add Kconfig option to control Dom0 boot

2025-09-25 Thread Oleksii Moisieiev
On 25/09/2025 09:34, Jan Beulich wrote: > On 24.09.2025 18:00, Oleksii Moisieiev wrote: >> --- a/xen/common/Kconfig >> +++ b/xen/common/Kconfig >> @@ -26,6 +26,14 @@ config DOM0LESS_BOOT >>Xen boot without the need of a control domain (Dom0), which could be >>present anyway. >>

Re: [PATCH for-4.21] x86/cpu: populate CPUID 0x1.edx features early for self-snoop detection

2025-09-25 Thread Roger Pau Monné
On Thu, Sep 25, 2025 at 09:41:43AM +0200, Jan Beulich wrote: > On 25.09.2025 09:40, Roger Pau Monné wrote: > > On Thu, Sep 25, 2025 at 09:37:46AM +0200, Jan Beulich wrote: > >> On 25.09.2025 09:34, Roger Pau Monné wrote: > >>> On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote: > On 2

RE: [PATCH v2 17/26] xen/domctl: wrap xsm_set_target() with CONFIG_MGMT_HYPERCALLS

2025-09-25 Thread Penny, Zheng
[Public] > -Original Message- > From: Jan Beulich > Sent: Thursday, September 11, 2025 7:34 PM > To: Penny, Zheng > Cc: xen-devel@lists.xenproject.org; Huang, Ray ; Daniel > P. Smith ; Stefano Stabellini > > Subject: Re: [PATCH v2 17/26] xen/domctl: wrap xsm_set_target() with > CONFIG_M

RE: [PATCH v2 16/26] xen/domctl: wrap arch-specific domain_set_time_offset() with CONFIG_MGMT_HYPERCALLS

2025-09-25 Thread Penny, Zheng
[Public] > -Original Message- > From: Jan Beulich > Sent: Thursday, September 11, 2025 7:28 PM > To: Penny, Zheng ; Stefano Stabellini > > Cc: Huang, Ray ; Julien Grall ; Bertrand > Marquis ; Orzel, Michal ; > Volodymyr Babchuk ; Andrew Cooper > ; Anthony PERARD ; > Roger Pau Monné ; xen

Re: [PATCH for-4.21] x86/cpu: populate CPUID 0x1.edx features early for self-snoop detection

2025-09-25 Thread Jan Beulich
On 25.09.2025 09:40, Roger Pau Monné wrote: > On Thu, Sep 25, 2025 at 09:37:46AM +0200, Jan Beulich wrote: >> On 25.09.2025 09:34, Roger Pau Monné wrote: >>> On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote: On 24.09.2025 15:40, Roger Pau Monné wrote: > On Wed, Sep 24, 2025 at 1

Re: [PATCH] Arm: tidy page_get_owner_and_nr_reference()

2025-09-25 Thread Jan Beulich
On 14.07.2025 09:26, Jan Beulich wrote: > On 12.07.2025 12:37, Julien Grall wrote: >> On 03/07/2025 11:04, Jan Beulich wrote: >>> On 03.07.2025 10:52, Julien Grall wrote: On 02/07/2025 14:37, Jan Beulich wrote: > On 02.07.2025 15:18, Julien Grall wrote: >> On 02/07/2025 14:06, Jan Beul

Re: [PATCH for-4.21] x86/cpu: populate CPUID 0x1.edx features early for self-snoop detection

2025-09-25 Thread Roger Pau Monné
On Thu, Sep 25, 2025 at 09:37:46AM +0200, Jan Beulich wrote: > On 25.09.2025 09:34, Roger Pau Monné wrote: > > On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote: > >> On 24.09.2025 15:40, Roger Pau Monné wrote: > >>> On Wed, Sep 24, 2025 at 11:50:02AM +, Andrew Cooper wrote: > On

Re: [PATCH for-4.21] x86/cpu: populate CPUID 0x1.edx features early for self-snoop detection

2025-09-25 Thread Jan Beulich
On 25.09.2025 09:34, Roger Pau Monné wrote: > On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote: >> On 24.09.2025 15:40, Roger Pau Monné wrote: >>> On Wed, Sep 24, 2025 at 11:50:02AM +, Andrew Cooper wrote: On 24/09/2025 4:00 am, Roger Pau Monne wrote: > Otherwise the check f

Ping: [PATCH] symbols: discard stray file symbols

2025-09-25 Thread Jan Beulich
On 16.04.2025 11:00, Jan Beulich wrote: > By observation GNU ld 2.25 may emit file symbols for .data.read_mostly > when linking xen.efi. Due to the nature of file symbols in COFF symbol > tables (see the code comment) the symbols_offsets[] entries for such > symbols would cause assembler warnings r

Re: [PATCH for-4.21] x86/cpu: populate CPUID 0x1.edx features early for self-snoop detection

2025-09-25 Thread Roger Pau Monné
On Thu, Sep 25, 2025 at 09:03:06AM +0200, Jan Beulich wrote: > On 24.09.2025 15:40, Roger Pau Monné wrote: > > On Wed, Sep 24, 2025 at 11:50:02AM +, Andrew Cooper wrote: > >> On 24/09/2025 4:00 am, Roger Pau Monne wrote: > >>> Otherwise the check for the SS feature in > >>> check_memory_type_se

Ping: [PATCH 0/3] efi: Shim LoadImage improvements

2025-09-25 Thread Jan Beulich
On 11.09.2025 10:24, Gerald Elder-Vass wrote: > A previous series for supporting Shim's LoadImage protocol had some > outstanding comments after it had been accepted, and internal review > revealed an improvement to be safe when unloading the image. > > This patch series includes those changes. >

Re: [PATCH for-4.21] x86/cpu: populate CPUID 0x1.edx features early for self-snoop detection

2025-09-25 Thread Jan Beulich
On 24.09.2025 15:40, Roger Pau Monné wrote: > On Wed, Sep 24, 2025 at 11:50:02AM +, Andrew Cooper wrote: >> On 24/09/2025 4:00 am, Roger Pau Monne wrote: >>> Otherwise the check for the SS feature in >>> check_memory_type_self_snoop_errata() fails unconditionally, which leads to >>> X86_FEATURE