From nobody Mon Mar 23 19:54:06 2026 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass header.i=teddy.astie@vates.tech; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=vates.tech ARC-Seal: i=1; a=rsa-sha256; t=1773758048; cv=none; d=zohomail.com; s=zohoarc; b=nQ+rZWDrOiJ8/0VJDs6tF/DxWAqZ6gvo1pQI1L3+kLFGdct+vi3ibeC78VLD353DXZGaffTS9WQoshPnPQzO5y2YI0SmotR/7xKGC8/29UT5n69oQdwTr3MGv/LFk9B5m6rLUnfy6UIBGCKytqBy6S88kjHVqEi+wQQR0z2jQyM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1773758048; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=yP02+0uBPHUXsiASIR73DDkx2uRR822xGjQSXWhWDpc=; b=A8505WtOTpGyPGr6oCkoFxl1Y4kfiNNECYz5P6tGCQnY6gH4tlUts60PxmcUH8khrFKNuWd8srPW5WF+LpZ5OZ/spc5v/4uTomaxlpsJ++yUgbtlVIQQQe6Pe5+rVZboXIV2FxBTzfHFxeuHJj8qliGdi8F5VexbpvNTIAe693w= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass header.i=teddy.astie@vates.tech; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1773758048671167.73410521007156; Tue, 17 Mar 2026 07:34:08 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1256156.1550860 (Exim 4.92) (envelope-from ) id 1w2VUL-0008Eh-Jx; Tue, 17 Mar 2026 14:33:41 +0000 Received: by outflank-mailman (output) from mailman id 1256156.1550860; Tue, 17 Mar 2026 14:33:41 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w2VUL-0008Ea-Gw; Tue, 17 Mar 2026 14:33:41 +0000 Received: by outflank-mailman (input) for mailman id 1256156; Tue, 17 Mar 2026 14:33:40 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1w2VUJ-0008EU-UC for xen-devel@lists.xenproject.org; Tue, 17 Mar 2026 14:33:40 +0000 Received: from mail136-12.atl41.mandrillapp.com (mail136-12.atl41.mandrillapp.com [198.2.136.12]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 48064eb8-220e-11f1-b164-2bf370ae4941; Tue, 17 Mar 2026 15:33:36 +0100 (CET) Received: from pmta11.mandrill.prod.atl01.rsglab.com (localhost [127.0.0.1]) by mail136-12.atl41.mandrillapp.com (Mailchimp) with ESMTP id 4fZvb26Rngz5QkT4K for ; Tue, 17 Mar 2026 14:33:34 +0000 (GMT) Received: from [37.26.189.201] by mandrillapp.com id 60c5da4bde924900a8e998088ebd28d4; Tue, 17 Mar 2026 14:33:34 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 48064eb8-220e-11f1-b164-2bf370ae4941 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mandrillapp.com; s=mte1; t=1773758014; x=1774028014; bh=yP02+0uBPHUXsiASIR73DDkx2uRR822xGjQSXWhWDpc=; h=From:Subject:To:Cc:Message-Id:Feedback-ID:Date:MIME-Version: Content-Type:Content-Transfer-Encoding:CC:Date:Subject:From; b=ZPofbuxn/SMw/KVXd9rqtltVNNRz4RPZQ/2sa/5FWysElJrhWY7/TMXuPHzdOHPch gTtpqfhNEbeEXBZGX30R/49shVtry8TxTMIAxozVueyJ0AtSuwN0nMGVJ1xkT04T47 JFCv88IsPpL+uRTYvRmqnGbNgYHv+qsRm32PFIjD4NqU6aHd0T+MC0A7Eq814S08OS RUAbtkxyKGLmPxMbNkRPZwW04ugrK1uqDhNLINYZE7SyDviRgJC0c9Fr8d/QkhxCYA Fwx0jTSghHCeQA81I7y53GLW8niN6ivaHEv4U4DrwevMp3BNa8QpF8ZahN+3xJGGDj LM9p4Gz5dTbtw== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=vates.tech; s=mte1; t=1773758014; x=1774018514; i=teddy.astie@vates.tech; bh=yP02+0uBPHUXsiASIR73DDkx2uRR822xGjQSXWhWDpc=; h=From:Subject:To:Cc:Message-Id:Feedback-ID:Date:MIME-Version: Content-Type:Content-Transfer-Encoding:CC:Date:Subject:From; b=GWrn76jU91H9kGJj4h2vp1vkReuccrB9/U0fEf52rrQHhWvoA68jE4edRNhgrWxqK eREL5n5zZJldbqMjuCph44W7Wveav4+eUFF4/1w95ILFEZDlreOIOXIae/yXvDKPOP VtAVdQnu2oOkBzEfy91d29f6vLU2S8NFJAMM0m+7DYORBHIRI+9x7GAMEtBzHrm93/ dEEYZbkrn+J59lC+y9k/VrLJeOyC61HPKMrpdl9tXqmrJwj6byLD2sP+gZvfG8MZ9N Ua6bfJUX85mRfpNu5KOjm6QOznmuRszdVricFnIIZvBM6SEzXy/2YWFiEsLjB6lduw p9I+6DgtWDH8g== From: "Teddy Astie" Subject: =?utf-8?Q?[PATCH=20v2]=20efi:=20Enable=20EFI=5FSET=5FVIRTUAL=5FADDRESS=5FMAP=20by=20default?= X-Mailer: git-send-email 2.53.0 X-Bm-Disclaimer: Yes X-Bm-Milter-Handled: 4ffbd6c1-ee69-4e1b-aabd-f977039bd3e2 X-Bm-Transport-Timestamp: 1773758013577 To: xen-devel@lists.xenproject.org Cc: "Teddy Astie" , "Andrew Cooper" , "Anthony PERARD" , "Michal Orzel" , "Jan Beulich" , "Julien Grall" , "=?utf-8?Q?Roger=20Pau=20Monn=C3=A9?=" , "Stefano Stabellini" Message-Id: <14146a9dd53d1662d1e35220125d816045b2f184.1773757913.git.teddy.astie@vates.tech> X-Native-Encoded: 1 X-Report-Abuse: =?UTF-8?Q?Please=20forward=20a=20copy=20of=20this=20message,=20including=20all=20headers,=20to=20abuse@mandrill.com.=20You=20can=20also=20report=20abuse=20here:=20https://mandrillapp.com/contact/abuse=3Fid=3D30504962.60c5da4bde924900a8e998088ebd28d4?= X-Mandrill-User: md_30504962 Feedback-ID: 30504962:30504962.20260317:md Date: Tue, 17 Mar 2026 14:33:34 +0000 MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity teddy.astie@vates.tech) (identity @mandrillapp.com) X-ZM-MESSAGEID: 1773758051838154100 Content-Type: text/plain; charset="utf-8" Many machines fails to boot if this option is disabled. It's off by default as it was deemed too risky for being enabled by default late in the Xen 4.13 cycle, but found out to be safe. As there are no known drawback by having this option on, enable it by default. Signed-off-by: Teddy Astie Acked-by: Marek Marczykowski-G=C3=B3recki --- v2: - review commit description - drop "If unsure" note xen/common/Kconfig | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/xen/common/Kconfig b/xen/common/Kconfig index d7e79e752a..0a20aa0a12 100644 --- a/xen/common/Kconfig +++ b/xen/common/Kconfig @@ -363,14 +363,13 @@ config KEXEC =20 config EFI_SET_VIRTUAL_ADDRESS_MAP bool "EFI: call SetVirtualAddressMap()" if EXPERT + default y help Call EFI SetVirtualAddressMap() runtime service to setup memory map = for further runtime services. According to UEFI spec, it isn't strictly necessary, but many UEFI implementations misbehave when this call is missing. =20 - If unsure, say N. - config XSM bool "Xen Security Modules support" default ARM --=20 2.53.0 -- Teddy Astie | Vates XCP-ng Developer XCP-ng & Xen Orchestra - Vates solutions web: https://vates.tech