From nobody Mon Jan 26 07:40:24 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1768902014; cv=pass; d=zohomail.com; s=zohoarc; b=HHklqsuFL2n04BCTwk29BVR3N7dsgFa/cKL7+C5IY4SxfYhSKsC5TLYOJDl/RNS0bg40XRUD9ock3Na+0R7lkRyODmu+OdRawKfNXsL+nJDVvEqcnL9D3/71LeJUx6i6TDWBtMUvCBUGXMrgsuGRW2A3bKpzEenay1sclTqWd+s= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1768902014; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=S7JUwPOWscttGNrjWYKOuXxkeyKAiYXYN+soRUeRFk0=; b=V6oUBopE/AxMeNlAde9keOFcBGuV8vBKghK1MeqihMZFUKxT1yuF2CvbGWqH9hwqxnCkSHvB9OS288imHcDj+IbBF2efQZUVUdKtDTlw/LlR5us/Z6+A6aaulq73qoJKEX/RV0yJRQtZ4XA9mH5AYNZlIteUXzGkeeUbmy5XEZU= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1768902014113104.82024707163828; Tue, 20 Jan 2026 01:40:14 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1208504.1520691 (Exim 4.92) (envelope-from ) id 1vi8DD-0001sP-73; Tue, 20 Jan 2026 09:39:47 +0000 Received: by outflank-mailman (output) from mailman id 1208504.1520691; Tue, 20 Jan 2026 09:39:47 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8DD-0001qm-1x; Tue, 20 Jan 2026 09:39:47 +0000 Received: by outflank-mailman (input) for mailman id 1208504; Tue, 20 Jan 2026 09:39:46 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8DB-0001NH-Rt for xen-devel@lists.xenproject.org; Tue, 20 Jan 2026 09:39:45 +0000 Received: from MW6PR02CU001.outbound.protection.outlook.com (mail-westus2azlp170120002.outbound.protection.outlook.com [2a01:111:f403:c007::2]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id f0253c26-f5e3-11f0-9ccf-f158ae23cfc8; Tue, 20 Jan 2026 10:39:40 +0100 (CET) Received: from SN6PR04CA0094.namprd04.prod.outlook.com (2603:10b6:805:f2::35) by CH1PR12MB9574.namprd12.prod.outlook.com (2603:10b6:610:2ae::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.9; Tue, 20 Jan 2026 09:39:32 +0000 Received: from SN1PEPF0002BA4E.namprd03.prod.outlook.com (2603:10b6:805:f2:cafe::c3) by SN6PR04CA0094.outlook.office365.com (2603:10b6:805:f2::35) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9520.12 via Frontend Transport; Tue, 20 Jan 2026 09:39:32 +0000 Received: from satlexmb07.amd.com (165.204.84.17) by SN1PEPF0002BA4E.mail.protection.outlook.com (10.167.242.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.4 via Frontend Transport; Tue, 20 Jan 2026 09:39:32 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Tue, 20 Jan 2026 03:39:29 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f0253c26-f5e3-11f0-9ccf-f158ae23cfc8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TxbpohVAYrDNQcg1dDDpEI3oWWHnVfhsVuHFkA8qT/V0156o6walgPUUmMAL5LohRm2nf7gu5z6hTQrG24cH4UyxeTHoTtBVdZtp5lBu7DLl16wZiDzdhuhxOT111r2NpKiSa5vofXdXMH0FawvIw/8TUZyGlpxzqHECTyhASvoW98Kp/Tu3YsNBPuChkBRkgWpmhgJDYd/yIT6KcjgxXMTBjJlLTAlEavjJPpN+IIpyu574LLp9m8ADlOkPYqXqgo/rUhQs2IBbYLVGUaLyrt4RF/gZLnD8ZBiyvifMD/RN6r/JsoLi1Vdxamco4mftjCF5/Zl5X4wkKc31+mFXpA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=S7JUwPOWscttGNrjWYKOuXxkeyKAiYXYN+soRUeRFk0=; b=syZS5AFahm9lRz6g/CQqgoCHQuJsOlwQjvuxNOVPonwkpcamhXXwKm7eMQkwAYYpSWXgwAkH53Xt50KGMfnhn6ew+7CFtjfYHqtIxMQDsoXJ03zszNnOnIHaGdujIg0mwxnKRkIF+i4bg+nyeRJUqRWXEa8jmrH5pYwUv4gLj60LvabKlxNicSRG+v7kO5UAPvLffwt/cdN7Eu6GXjBX0TZcdLZHnwZ9+6hlWrHEdPzd39qyU02T7e+Zz887C88HUSGkjp89nHYlkfpZPCAwvACoXXL5HZlGB+YB+pd35l+rBEwVn0Oy9cNHe5drnhbJCy6nuCud2TOMiZn0L4JT3g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=S7JUwPOWscttGNrjWYKOuXxkeyKAiYXYN+soRUeRFk0=; b=aAT788GrX+qxs+2s3ZH12Zmqw3pfc1jEf6JdyyjG7LBLaXRFq8MHzH4rqEOrmpD2ufLygJWTRS+2RvuewyJ7fp+HpSCgu5Y1cLArXyKe5AkheJ2JIgeVbreXy6acB/NmxrpgcsMsgpdsNCFwIQ4KbonS7fUnlU16bmnLnPOMlWg= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , "Julien Grall" , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini , "Daniel P. Smith" , =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= Subject: [PATCH v4 1/5] x86/ucode: Add Kconfig option to remove microcode loading Date: Tue, 20 Jan 2026 10:38:46 +0100 Message-ID: <20260120093852.2380-2-alejandro.garciavallejo@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> References: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: satlexmb08.amd.com (10.181.42.217) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF0002BA4E:EE_|CH1PR12MB9574:EE_ X-MS-Office365-Filtering-Correlation-Id: 3b4ea7b1-5b2b-46e8-7ca2-08de5807d09c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|36860700013|376014|1800799024|82310400026; X-Microsoft-Antispam-Message-Info: =?utf-8?B?RjNET005SmJTektNZWY5RGhsVldyd1ozSkM4K1ZOWEZ5TFVFT1YwUnZPU2ds?= =?utf-8?B?RGZ4d2paaW10YU52WkVZTm52YnJva2ZxTEtTQk53UUlxemJxN1FoNDNESWxx?= =?utf-8?B?SDZjN0NkRi9kNHNUVnpReDgzdUF3bUkvTFZkcURVdFJGT0pkMVAwaWZyK2dC?= =?utf-8?B?cnJ4VFJ6QnNvMmNEK0h2Smg5ckJkdmZQWGhJMlFvblRzZmpEUW9IYVJSd2Iy?= =?utf-8?B?OEhjdkRsU3ZyT0o3TUdjKzAxT0lLUk9lUTRRTUtkZXJHd2U4SzAzcDQzZTJ6?= =?utf-8?B?czVTMkpxb1J2U3hPTWw0T2p4TFpicFY0ektnend5dDd6UktWUVhpVG02SjU4?= =?utf-8?B?WVgvMjFBYWwwQ3l5VFZDSmI1WHNMQi9pc09Dd1ovQkNMM0xnY0czWjN4SThp?= =?utf-8?B?K1VhOU5LaWg4YWFJR0VwTmdGT3MyUjVIcGpsSnRWazN3Vm9Ta3pZRC9SZmxT?= =?utf-8?B?TkRFT0I5cnhMcEZxcFVadFdycFZtNC9XTXpZRFNQbU8xRGZsZjhMRlk0b010?= =?utf-8?B?SmMxZ1JIb2dmdGRpL0tOK1dLS1VWa3lQVWtMcjdKdlVHSzJUT3FGU0VMVVJC?= =?utf-8?B?bWNwYUpxZWFxa3U0N20zY0RON3RVU0Q3NHQ2RllWeGR4blR5UFpNVHNscWhm?= =?utf-8?B?N25USVpLVmw1MkI0TjRUZSsveWp1N0NFK2MvVUlVMUdUQzdQUm1tNVNMZ1VP?= =?utf-8?B?bllnWXlta3MwdkF0a01oS3I4YmNTRENFZjI2WTlRYTF1Qm95Z0xhOWRLVDBs?= =?utf-8?B?TEFDSXVISXJpREdMcXpqTmUxZ01EWEY4cDU5NzdXZUFlclo2bDhMUmQ1L05y?= =?utf-8?B?cWNCV2tTcXNpMksvdGpWYmdVbjVFUWVVZzVGK2VwbG9aYVJKTTVibjhGOXZm?= =?utf-8?B?Rk1zSjl5alFCaktjNkYyeGdGMlp0WlEvSDhLS2tNOStLK21NSjJTa0V6Vy80?= =?utf-8?B?UTNIUkl3UGo1My9MYjlQTnJrbmxDWDhGUGRzeG1IOGJ1QzVUclFzTW9hREh1?= =?utf-8?B?dm80S3ZETG5ITURWTmtONkRDa3AvWWhEak1ubmMyTndmc3JpTCtlZXAvTU1J?= =?utf-8?B?RGxmYzlGbHRTMXhQcmYxeHR6ZjlYV0lnQlVvWnhjdUtnTlY2bFBEVFh3cDl0?= =?utf-8?B?UDNFcTlNREg3R01pZnRoN3ZsMEQrT2F5RHVPRlVWSXpQL2tuVzFYN2tvUnIw?= =?utf-8?B?U2tIcGN6ZGQwMnZxSDRIcmdkcU51cUFOam9PeXVScHRwSllieE5VUWRXcEk3?= =?utf-8?B?S2U5dm1jQ3V5Z2FiR3JWTGRVL0c4bHoyN1FOTU5YVnZFSGQyVWpZeTQzUGhm?= =?utf-8?B?YStocm4zTHgwUGNsREs2VEVQVmduYnM3alZLdy9nTkN6Zm5oMUdIbVJweTBQ?= =?utf-8?B?WnFxUVRUVXczMlI1RW14VHhjZ0ZhdGVUV1hqeWdWcng3SlFQUnpHTC9ZZzF5?= =?utf-8?B?WnVCZ3JUNnFMTEFGdFdGY1BPKzR5bURiaGEwZzR5T3ZVZkFpTGtGRHg2VUo5?= =?utf-8?B?bGVaOVcvU2lwdkdlZzl6SC85TUpQTTc5Rm4rRmRVaFNoRGRNd2Q2QTlYVHpB?= =?utf-8?B?alRGK2g4bFBhM0czVlU3MXNNdVo2cmNBOXRZT3dvcnpTY21XRlVtSlZLZUxv?= =?utf-8?B?L2tVdXRiS2FrTGU1OFBKZE4zTjZKczVZWHV3RlpiSjFjUDNOZjZTYzFqUUhB?= =?utf-8?B?VzdZYzQvaTNDUHUzdVFsRTBnRlk0bFJaLzRNaGJ3bVhJeUhKcVBhTUt6cW9Q?= =?utf-8?B?KzdKMThSSk5oMU5WUVFMSExhN2hYWnRSMjdWMFpvekVDT2ZkWkltOVROWG5x?= =?utf-8?B?Tk56SFAxUzNMbFJ3c1lzR2ZuT3NJNTJiL2hCbEI0NjVSUVlEc2VLV0dXWFVh?= =?utf-8?B?aVpCUnhZZmVxZ3crSzQyd1JtTmlNMUwrMG52c0J6Q28xQmk4RDRISnNVTm8x?= =?utf-8?B?MmgwWE1QeVk4NzlyODRxZzhzdUI2aXptdGRaeUV3aldPK1VBQzdJMitkWHZC?= =?utf-8?B?NTV0V3pKc2tlaTZDaVY3YVI3bVBKUi9QcnBCL0R5blF2TEZRL2lWcTRyc0Q4?= =?utf-8?B?UEVSWjhVblh1UlcvQnBlalUrRTgxWDBEck53bHZoQkhaWDFxTFZBeDY1cXho?= =?utf-8?B?LzhSb1AzYitBRkYxSk92WVVMUUhscDlSQm41b0hiSzZGaE1CY3h6M2ZLQm5i?= =?utf-8?B?TWZWMGFKWThkSEVBWkF1Sk9IejR2bGdId1lZb3NWZS9UaDBmY2phSjdHNHRh?= =?utf-8?B?VVdhcnVPWGN5a2RtWDVHaVhkRnVnPT0=?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(36860700013)(376014)(1800799024)(82310400026);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jan 2026 09:39:32.0511 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3b4ea7b1-5b2b-46e8-7ca2-08de5807d09c X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF0002BA4E.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH1PR12MB9574 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1768902016847154100 Amend docs to reflect ucode=3D command/stanza depend on MICROCODE_LOADING being set. The new MICROCODE_OP() is a conditional setter for the microcode_ops struct. By using IS_ENABLED() there rather than ifdef we allow DCE to remove all statics no longer used when microcode loading is disabled without tagging them with __maybe_unused. Signed-off-by: Alejandro Vallejo Reviewed-by: Andrew Cooper --- v4: * Minor spell fix in commit message ("rather") * efi.pandoc: terminate sentence with "enabled". * xen-command-line: State applicability as first line. * reorder cpu hooks. * MICROCODE_OP() comment * MICROCODE_OP() moved next to microcode_ops * Re-arranged platform_ops to turn them into smaller hunks. --- docs/admin-guide/microcode-loading.rst | 2 ++ docs/misc/efi.pandoc | 2 ++ docs/misc/xen-command-line.pandoc | 7 ++++--- xen/arch/x86/Kconfig | 14 ++++++++++++++ xen/arch/x86/cpu/microcode/amd.c | 16 +++++++++------- xen/arch/x86/cpu/microcode/core.c | 15 ++++++++++++--- xen/arch/x86/cpu/microcode/intel.c | 11 +++++++---- xen/arch/x86/cpu/microcode/private.h | 3 +++ xen/arch/x86/efi/efi-boot.h | 3 ++- xen/arch/x86/platform_hypercall.c | 10 ++++++++-- 10 files changed, 63 insertions(+), 20 deletions(-) diff --git a/docs/admin-guide/microcode-loading.rst b/docs/admin-guide/micr= ocode-loading.rst index a07e25802f..148bc8559b 100644 --- a/docs/admin-guide/microcode-loading.rst +++ b/docs/admin-guide/microcode-loading.rst @@ -23,6 +23,8 @@ TSX errata which necessitated disabling the feature entir= ely), or the addition of brand new features (e.g. the Spectre v2 controls to work around specula= tive execution vulnerabilities). =20 +Microcode loading support in Xen is controlled by the +``CONFIG_MICROCODE_LOADING`` Kconfig option. =20 Boot time microcode loading --------------------------- diff --git a/docs/misc/efi.pandoc b/docs/misc/efi.pandoc index 11c1ac3346..8198a7f063 100644 --- a/docs/misc/efi.pandoc +++ b/docs/misc/efi.pandoc @@ -104,6 +104,8 @@ Specifies an XSM module to load. =20 Specifies a CPU microcode blob to load. (x86 only) =20 +Only available when Xen is compiled with CONFIG_MICROCODE_LOADING enabled. + ###`dtb=3D` =20 Specifies a device tree file to load. The platform firmware may provide a diff --git a/docs/misc/xen-command-line.pandoc b/docs/misc/xen-command-line= .pandoc index 15f7a315a4..0eca489b7d 100644 --- a/docs/misc/xen-command-line.pandoc +++ b/docs/misc/xen-command-line.pandoc @@ -2751,9 +2751,10 @@ performance. Applicability: x86 Default: `scan` is selectable via Kconfig, `nmi,digest-check` =20 -Controls for CPU microcode loading. For early loading, this parameter can -specify how and where to find the microcode update blob. For late loading, -this parameter specifies if the update happens within a NMI handler. +Controls for CPU microcode loading, available when `CONFIG_MICROCODE_LOADI= NG` is +enabled. For early loading, this parameter can specify how and where to fi= nd the +microcode update blob. For late loading, this parameter specifies if the u= pdate +happens within a NMI handler. =20 'integer' specifies the CPU microcode update blob module index. When posit= ive, this specifies the n-th module (in the GrUB entry, zero based) to be used diff --git a/xen/arch/x86/Kconfig b/xen/arch/x86/Kconfig index d5705e4bff..61f58aa829 100644 --- a/xen/arch/x86/Kconfig +++ b/xen/arch/x86/Kconfig @@ -331,8 +331,22 @@ config REQUIRE_NX was unavailable. However, if enabled, Xen will no longer boot on any CPU which is lacking NX support. =20 +config MICROCODE_LOADING + bool "Microcode loading" + default y + help + Microcode updates for CPUs fix errata and provide new functionality for + software to work around bugs, such as the speculative execution + vulnerabilities.=C2=A0It is common for OSes to carry updated microcode = as + software tends to get updated more frequently than firmware. + + For embedded environments where a full firmware/software stack is being + provided, it might not be necessary for Xen to need to load microcode + itself. + config MICROCODE_SCAN_DEFAULT bool "Scan for microcode by default" + depends on MICROCODE_LOADING help During boot, Xen can scan the multiboot images for a CPIO archive containing CPU microcode to be loaded, which is Linux's mechanism for diff --git a/xen/arch/x86/cpu/microcode/amd.c b/xen/arch/x86/cpu/microcode/= amd.c index 71b041c84b..c1ab6deb4d 100644 --- a/xen/arch/x86/cpu/microcode/amd.c +++ b/xen/arch/x86/cpu/microcode/amd.c @@ -561,11 +561,11 @@ static const char __initconst amd_cpio_path[] =3D "kernel/x86/microcode/AuthenticAMD.bin"; =20 static const struct microcode_ops __initconst_cf_clobber amd_ucode_ops =3D= { - .cpu_request_microcode =3D cpu_request_microcode, .collect_cpu_info =3D collect_cpu_info, - .apply_microcode =3D apply_microcode, - .compare =3D amd_compare, - .cpio_path =3D amd_cpio_path, + .cpu_request_microcode =3D MICROCODE_OP(cpu_request_microco= de), + .apply_microcode =3D MICROCODE_OP(apply_microcode), + .compare =3D MICROCODE_OP(amd_compare), + .cpio_path =3D MICROCODE_OP(amd_cpio_path), }; =20 void __init ucode_probe_amd(struct microcode_ops *ops) @@ -574,7 +574,8 @@ void __init ucode_probe_amd(struct microcode_ops *ops) * The Entrysign vulnerability (SB-7033, CVE-2024-36347) affects Zen1-5 * CPUs. Taint Xen if digest checking is turned off. */ - if ( boot_cpu_data.family >=3D 0x17 && boot_cpu_data.family <=3D 0x1a = && + if ( IS_ENABLED(CONFIG_MICROCODE_LOADING) && + boot_cpu_data.family >=3D 0x17 && boot_cpu_data.family <=3D 0x1a = && !opt_digest_check ) { printk(XENLOG_WARNING @@ -614,8 +615,9 @@ void __init amd_check_entrysign(void) unsigned int curr_rev; uint8_t fixed_rev; =20 - if ( boot_cpu_data.vendor !=3D X86_VENDOR_AMD || - boot_cpu_data.family < 0x17 || + if ( !IS_ENABLED(CONFIG_MICROCODE_LOADING) || + boot_cpu_data.vendor !=3D X86_VENDOR_AMD || + boot_cpu_data.family < 0x17 || boot_cpu_data.family > 0x1a ) return; =20 diff --git a/xen/arch/x86/cpu/microcode/core.c b/xen/arch/x86/cpu/microcode= /core.c index dabdb95b4c..efaf808f1a 100644 --- a/xen/arch/x86/cpu/microcode/core.c +++ b/xen/arch/x86/cpu/microcode/core.c @@ -58,7 +58,7 @@ */ #define MICROCODE_UPDATE_TIMEOUT_US 1000000 =20 -static bool __initdata ucode_mod_forced; +static bool __initdata __maybe_unused ucode_mod_forced; static unsigned int nr_cores; =20 /* @@ -104,6 +104,7 @@ static int __initdata opt_mod_idx; static bool __initdata opt_scan =3D IS_ENABLED(CONFIG_MICROCODE_SCAN_DEFAU= LT); bool __ro_after_init opt_digest_check =3D true; =20 +#ifdef CONFIG_MICROCODE_LOADING /* * Used by the EFI path only, when xen.cfg identifies an explicit microcode * file. Overrides ucode=3D|scan on the regular command line. @@ -162,6 +163,7 @@ static int __init cf_check parse_ucode(const char *s) return rc; } custom_param("ucode", parse_ucode); +#endif /* CONFIG_MICROCODE_LOADING */ =20 static struct microcode_ops __ro_after_init ucode_ops; =20 @@ -469,7 +471,7 @@ struct ucode_buf { char buffer[]; }; =20 -static long cf_check ucode_update_hcall_cont(void *data) +static long cf_check __maybe_unused ucode_update_hcall_cont(void *data) { struct microcode_patch *patch =3D NULL; int ret, result; @@ -613,6 +615,7 @@ static long cf_check ucode_update_hcall_cont(void *data) return ret; } =20 +#ifdef CONFIG_MICROCODE_LOADING int ucode_update_hcall(XEN_GUEST_HANDLE(const_void) buf, unsigned long len, unsigned int flags) { @@ -645,6 +648,7 @@ int ucode_update_hcall(XEN_GUEST_HANDLE(const_void) buf, */ return continue_hypercall_on_cpu(0, ucode_update_hcall_cont, buffer); } +#endif /* CONFIG_MICROCODE_LOADING */ =20 /* Load a cached update to current cpu */ int microcode_update_one(void) @@ -658,7 +662,7 @@ int microcode_update_one(void) if ( ucode_ops.collect_cpu_info ) alternative_vcall(ucode_ops.collect_cpu_info); =20 - if ( !ucode_ops.apply_microcode ) + if ( !IS_ENABLED(CONFIG_MICROCODE_LOADING) || !ucode_ops.apply_microco= de ) return -EOPNOTSUPP; =20 spin_lock(µcode_mutex); @@ -678,6 +682,7 @@ int microcode_update_one(void) */ static int __initdata early_mod_idx =3D -1; =20 +#ifdef CONFIG_MICROCODE_LOADING static int __init cf_check microcode_init_cache(void) { struct boot_info *bi =3D &xen_boot_info; @@ -734,6 +739,7 @@ static int __init cf_check microcode_init_cache(void) return rc; } presmp_initcall(microcode_init_cache); +#endif /* CONFIG_MICROCODE_LOADING */ =20 /* * There are several tasks: @@ -898,6 +904,9 @@ int __init early_microcode_init(struct boot_info *bi) =20 printk(XENLOG_INFO "BSP microcode revision: 0x%08x\n", this_cpu(cpu_si= g).rev); =20 + if ( !IS_ENABLED(CONFIG_MICROCODE_LOADING) ) + return -ENODEV; + /* * Some hypervisors deliberately report a microcode revision of -1 to * mean that they will not accept microcode updates. diff --git a/xen/arch/x86/cpu/microcode/intel.c b/xen/arch/x86/cpu/microcod= e/intel.c index 281993e725..dac464961a 100644 --- a/xen/arch/x86/cpu/microcode/intel.c +++ b/xen/arch/x86/cpu/microcode/intel.c @@ -408,17 +408,20 @@ static const char __initconst intel_cpio_path[] =3D "kernel/x86/microcode/GenuineIntel.bin"; =20 static const struct microcode_ops __initconst_cf_clobber intel_ucode_ops = =3D { - .cpu_request_microcode =3D cpu_request_microcode, .collect_cpu_info =3D collect_cpu_info, - .apply_microcode =3D apply_microcode, - .compare =3D intel_compare, - .cpio_path =3D intel_cpio_path, + .cpu_request_microcode =3D MICROCODE_OP(cpu_request_microco= de), + .apply_microcode =3D MICROCODE_OP(apply_microcode), + .compare =3D MICROCODE_OP(intel_compare), + .cpio_path =3D MICROCODE_OP(intel_cpio_path), }; =20 void __init ucode_probe_intel(struct microcode_ops *ops) { *ops =3D intel_ucode_ops; =20 + if ( !IS_ENABLED(CONFIG_MICROCODE_LOADING) ) + return; + if ( !can_load_microcode() ) ops->apply_microcode =3D NULL; } diff --git a/xen/arch/x86/cpu/microcode/private.h b/xen/arch/x86/cpu/microc= ode/private.h index e6c965dc99..77ce816c1a 100644 --- a/xen/arch/x86/cpu/microcode/private.h +++ b/xen/arch/x86/cpu/microcode/private.h @@ -8,6 +8,9 @@ /* Opaque. Internals are vendor-specific. */ struct microcode_patch; =20 +/* Aids dead-code elimination of the static hooks */ +#define MICROCODE_OP(x) (IS_ENABLED(CONFIG_MICROCODE_LOADING) ? (x) : NULL) + struct microcode_ops { /* * Parse a microcode container. Format is vendor-specific. diff --git a/xen/arch/x86/efi/efi-boot.h b/xen/arch/x86/efi/efi-boot.h index 0194720003..42a2c46b5e 100644 --- a/xen/arch/x86/efi/efi-boot.h +++ b/xen/arch/x86/efi/efi-boot.h @@ -295,7 +295,8 @@ static void __init efi_arch_cfg_file_late(const EFI_LOA= DED_IMAGE *image, { union string name; =20 - if ( read_section(image, L"ucode", &ucode, NULL) ) + if ( !IS_ENABLED(CONFIG_MICROCODE_LOADING) || + read_section(image, L"ucode", &ucode, NULL) ) return; =20 name.s =3D get_value(&cfg, section, "ucode"); diff --git a/xen/arch/x86/platform_hypercall.c b/xen/arch/x86/platform_hype= rcall.c index f8eca48170..2ac9fc2d96 100644 --- a/xen/arch/x86/platform_hypercall.c +++ b/xen/arch/x86/platform_hypercall.c @@ -317,8 +317,11 @@ ret_t do_platform_op( { XEN_GUEST_HANDLE(const_void) data; =20 - guest_from_compat_handle(data, op->u.microcode.data); + ret =3D -EOPNOTSUPP; + if ( !IS_ENABLED(CONFIG_MICROCODE_LOADING) ) + break; =20 + guest_from_compat_handle(data, op->u.microcode.data); ret =3D ucode_update_hcall(data, op->u.microcode.length, 0); break; } @@ -327,8 +330,11 @@ ret_t do_platform_op( { XEN_GUEST_HANDLE(const_void) data; =20 - guest_from_compat_handle(data, op->u.microcode2.data); + ret =3D -EOPNOTSUPP; + if ( !IS_ENABLED(CONFIG_MICROCODE_LOADING) ) + break; =20 + guest_from_compat_handle(data, op->u.microcode2.data); ret =3D ucode_update_hcall(data, op->u.microcode2.length, op->u.microcode2.flags); break; --=20 2.43.0 From nobody Mon Jan 26 07:40:24 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1768902010; cv=pass; d=zohomail.com; s=zohoarc; b=TxOnnsiOvbL1hRswkJzOgkcoup5rzmC7SybKvyCkhdqPJzH2DLO+1PU/GxX8sXyAsc0JQnz5ae/3r3e3a2pkOvsm7G8c/Q1tVhEjsWKQJMJlSCux0YU4Y36BpTMksNdX9zbZHKoPhm5AY7O3/2AZOh9oDb+61z8llVybzpmFveY= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1768902010; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=62HqEqk8utj2zzHdDMhP2cMsxApDUfMNx+Y6Knj7xvY=; b=CrM9yiGzMvZJpSfuaGQOEiaqCgESDKKkZox49lfe8LUeOw6N74PtKh6MiWoI0Gc+ezyLd9w5zHCvXbfpDbSyAgPgiykViiZ3rSSfKgO1cuS+85D5CZhPQmzZ1b6OKxeBOY45QXvegYBnBM772cD61PPhIYb04HrZX35MFQs5f74= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1768902010539497.3256159738686; Tue, 20 Jan 2026 01:40:10 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1208505.1520701 (Exim 4.92) (envelope-from ) id 1vi8DE-00023s-1V; Tue, 20 Jan 2026 09:39:48 +0000 Received: by outflank-mailman (output) from mailman id 1208505.1520701; Tue, 20 Jan 2026 09:39:47 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8DD-00021n-Mx; Tue, 20 Jan 2026 09:39:47 +0000 Received: by outflank-mailman (input) for mailman id 1208505; Tue, 20 Jan 2026 09:39:46 +0000 Received: from se1-gles-flk1-in.inumbo.com ([94.247.172.50] helo=se1-gles-flk1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8DC-0001NH-7H for xen-devel@lists.xenproject.org; Tue, 20 Jan 2026 09:39:46 +0000 Received: from DM5PR21CU001.outbound.protection.outlook.com (mail-centralusazlp170110009.outbound.protection.outlook.com [2a01:111:f403:c111::9]) by se1-gles-flk1.inumbo.com (Halon) with ESMTPS id f1076146-f5e3-11f0-9ccf-f158ae23cfc8; Tue, 20 Jan 2026 10:39:41 +0100 (CET) Received: from SA9PR13CA0140.namprd13.prod.outlook.com (2603:10b6:806:27::25) by DS4PR12MB9587.namprd12.prod.outlook.com (2603:10b6:8:282::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9520.12; Tue, 20 Jan 2026 09:39:34 +0000 Received: from SN1PEPF0002BA51.namprd03.prod.outlook.com (2603:10b6:806:27:cafe::27) by SA9PR13CA0140.outlook.office365.com (2603:10b6:806:27::25) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.9 via Frontend Transport; Tue, 20 Jan 2026 09:39:34 +0000 Received: from satlexmb07.amd.com (165.204.84.17) by SN1PEPF0002BA51.mail.protection.outlook.com (10.167.242.74) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.4 via Frontend Transport; Tue, 20 Jan 2026 09:39:34 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Tue, 20 Jan 2026 03:39:31 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f1076146-f5e3-11f0-9ccf-f158ae23cfc8 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=VfkDOqS31wCdYnTpShbnmcVOXFOlJEA7cLPAHAcYDvDA6/uoZ17Q4iVY0ECN9qxYDZp6AoS7/b1Rv3D0bbnWhMjXJShx5iNHZumqYXLUKtJtY0ADLzt0y1A7knynwE0NBVtqbpZo9W0aYay6gOeS9ti1aKAfXOJGhhMDbRl9UQh/ps6jSIPVlp8kqOET/tKmI8fIxOge2PE2A0HwutMrVLuwYV10HaHfPh08zt0OxLCXAKz2qwJqTbGhbPnxdA7z6+BxzBfR+TlHrRf9wELuIVm5/vyySL1hcEdMHVxMjWtPmYN+L0qea6kNxHLxBViQ0q7E/4aWsRMdQohMNLQuIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=62HqEqk8utj2zzHdDMhP2cMsxApDUfMNx+Y6Knj7xvY=; b=EJabZY8Rr85CDe2gGdcU6wKNsUowQQc4v1u3TB6gB86XTlTDGUAhfn0TLKAZf38jKgYIbPe6d2MmfBPwI0O/L9QBHtxFY/4AOd2UlEaxbk9MIIZ4+Mhaeq50IZMZiO9/PY35bh5wOW8eT9hysQqLya4Fbp6FAb1aN1p1UUzdPCWYN01cVQvpSRELSt3qfYyC89uVnNlom1hCn5dxHGTU9vnmPFw8i4uL4ZB91Emyh0FvhGk0QA1y6Fe+g+WxytfwhwtfPlxh3pCnXdAaINl1hlel8D1jSTWSqpKbW+iXAcauXMQwpclXkX6Lms7YZTbBZ7mi7lrgirvpymIZH9/Xqg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=62HqEqk8utj2zzHdDMhP2cMsxApDUfMNx+Y6Knj7xvY=; b=T7NVIjuloptUwn1HTPAvA6rY9dc1UkW3MNPE9Z3LXGsI+LEihoxiVdu+BmLpCxx665AoSkk32YJ9QSf8gQQX9P9UZ5pRGIhtRJHjHLGpjLNA+GYAU6Xu1nl1xTe48/y0fYvlXoWBeJl783g838qNwXXB+iEbzwu37hlX42dgpFU= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , "Julien Grall" , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini Subject: [PATCH v4 2/5] xen: Allow lib-y targets to also be .init.o Date: Tue, 20 Jan 2026 10:38:47 +0100 Message-ID: <20260120093852.2380-3-alejandro.garciavallejo@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> References: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: satlexmb08.amd.com (10.181.42.217) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF0002BA51:EE_|DS4PR12MB9587:EE_ X-MS-Office365-Filtering-Correlation-Id: 3562909c-cbe8-4789-65df-08de5807d1db X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|376014|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?uMQIP/TVxaSLtVRj0dZi4wkb3WGbj4JQK4Ab6TZq9nHTKMom0CHilrbTu/Vo?= =?us-ascii?Q?yc3V18CEuXtsyZcsfrL1L/3UY+amhxZofOZ+YxaSvI9riqtI9D4GLKg5l3nX?= =?us-ascii?Q?i3uhz5nqQMwp0bdcKM7Jy6UOIrdKi5kXaDK9VUBHP12JRDkYzfqMGEpcoQ44?= =?us-ascii?Q?/5jX1sBK9nco4GuI3HUSyBH2X7lPp08GNZQ9mrOC8X8N/+tfURjYL862tqLK?= =?us-ascii?Q?S6JUTbomMeV/6HHBz9DsxH4mBZDQgdsO+/+E0Qqyd5BZABxPN4VtVbzm4du6?= =?us-ascii?Q?m+nKXqoIwzd7CRZ46kpsm7v5IJMYWj7R3C/ACuZPBuUrI7asBbhXzBc2dyxb?= =?us-ascii?Q?XPHCmpOWoNU4dp/J88CgU49U9glrUPYV0P8S+Ercd0RT9PPZ8w6md1f2He6Z?= =?us-ascii?Q?bcK3RRS3Zp7cJRwBSb1GX9IR3zIyCLah/Q/PLfK7N5JIBe1msm2ehRkLX9Ef?= =?us-ascii?Q?JG7MwRSMjnn8zjrQl3Nqc1Got+qnCaZyEJBYEYVGPF242+dKxyPPoiNXcbWN?= =?us-ascii?Q?lxAaeJZ52nqBj+D91ydDFAZpRzUiNLGU496gDTew9CtE+XExZGnDm0T4qMDR?= =?us-ascii?Q?pRA3W3m8OwzFyDq9n/9tU1VYjD6bJqZlfNeHJtL/6DHW27IANeuMuu5fob8c?= =?us-ascii?Q?Yvjuge28FPmb8UAuIeYF608s+BjniLALH5KDQM2aNxwaBtC/VRCP2xvPfIKp?= =?us-ascii?Q?A23vOSOo20r8kX/Rwl3AwaSi5rSxpIbm0FyZMmx6GGyozoJSTmF5NEzxtQxH?= =?us-ascii?Q?da68oah43Sp+RhFC/2yUOLuT8hY1d+xLqLz4RSRheh9Uk/ViAi9J9GaU0yQH?= =?us-ascii?Q?/aDsM6LRB76v+sg0TB7Q9NNTXTJU36vsBS12xQGs3Wmh5ITQWYxpfpeVCnX7?= =?us-ascii?Q?FIRPeNM+bFl2l4aKf2nXJ6JKO6ZxLN6pwEYbf6Kk/E0UFvHtb6cOfTubwoXd?= =?us-ascii?Q?h+F48DrO757mATR495y+G3jW1//nTetb6Co4/c80A1+LNDJ8zK+8Q5JqGwSK?= =?us-ascii?Q?e1SMSX6VfN+x482A3gBJnJEC7192vhme9TZ8VzlPG8X8XwRWb8H1gVs9mc8Z?= =?us-ascii?Q?BjpLkBw5fIbUh6xDaUnpMM/jGDIl4kahxI7n+qo/1mGwgznNPjlAPUkDBHG7?= =?us-ascii?Q?edeoMF3VWxdbHQba/QPftVtWQMEeQ//Xp9ZVdE7G/95aFq0MpaijxJqTAvI6?= =?us-ascii?Q?bf5cLUWTVQ3mImZDMxyQf4x04K8usjX9ihn5aATn1t85O0xDYJXpf0Na0qGs?= =?us-ascii?Q?2oTJ1vFG4MuEZ1pQNYOFP/fLHd6KVEEHuhN7s5EdPM3NWvLHlTodeheYu7GV?= =?us-ascii?Q?b/TQ6M1SLLQeTrm+iwnCQCY+6j2accDQ1NF+GfjLzWySA9TOrBYa9U69eXZY?= =?us-ascii?Q?1uqUK1fl8INyOpeQoW5huZxgH0DiGbiEoKi9L4lvoKfPkaONnrCMlyVSzPmn?= =?us-ascii?Q?QT0BwyyX5sEcWyAoX16lPRc+tt31v4wJiRc/KoP7Nm2fmYUTwWm/asQ2y3xv?= =?us-ascii?Q?idpz25lsSJxgQRZtniTEzaxIzLTV1mW6+Gt/3XFeo/nxr9aHLUPSV+1ywDWi?= =?us-ascii?Q?vnRw/WXpoVBy+agfVjdpNZwpJLwnPutLZ0X3AbhoViE9ZyU5ppCMUGdsN4w1?= =?us-ascii?Q?Hon/meMt1QICCBDtLu/k23RG9oj9iAR/VFkpKxrk+zk8K1IfTs5nEMJoqcVM?= =?us-ascii?Q?qcFcaA=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(376014)(36860700013)(1800799024);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jan 2026 09:39:34.1409 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3562909c-cbe8-4789-65df-08de5807d1db X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF0002BA51.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS4PR12MB9587 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1768902012745154100 Content-Type: text/plain; charset="utf-8" There's some assumptions as to which targets may be init-only. But there's little reason to preclude libraries from being init-only. Signed-off-by: Alejandro Vallejo Reviewed-by: Jan Beulich --- xen/Rules.mk | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/xen/Rules.mk b/xen/Rules.mk index 2b28d1ac3c..2c3f836c1b 100644 --- a/xen/Rules.mk +++ b/xen/Rules.mk @@ -130,9 +130,9 @@ endif =20 targets +=3D $(targets-for-builtin) =20 -$(filter %.init.o,$(obj-y) $(obj-bin-y) $(extra-y)): CFLAGS-y +=3D -DINIT_= SECTIONS_ONLY +$(filter %.init.o,$(obj-y) $(obj-bin-y) $(extra-y) $(lib-y)): CFLAGS-y += =3D -DINIT_SECTIONS_ONLY =20 -non-init-objects =3D $(filter-out %.init.o, $(obj-y) $(obj-bin-y) $(extra-= y)) +non-init-objects =3D $(filter-out %.init.o, $(obj-y) $(obj-bin-y) $(extra-= y) $(lib-y)) =20 ifeq ($(CONFIG_CC_IS_CLANG),y) cov-cflags-$(CONFIG_COVERAGE) :=3D -fprofile-instr-generate -fcoverage= -mapping @@ -146,7 +146,7 @@ endif $(call cc-option-add,cov-cflags-$(CONFIG_COVERAGE),CC,-fprofile-update=3Da= tomic) =20 # Reset cov-cflags-y in cases where an objects has another one as prerequi= site -$(nocov-y) $(filter %.init.o, $(obj-y) $(obj-bin-y) $(extra-y)): \ +$(nocov-y) $(filter %.init.o, $(obj-y) $(obj-bin-y) $(extra-y) $(lib-y)): \ cov-cflags-y :=3D =20 $(non-init-objects): _c_flags +=3D $(cov-cflags-y) @@ -156,7 +156,7 @@ ifeq ($(CONFIG_UBSAN),y) UBSAN_FLAGS :=3D $(filter-out -fno-%,$(CFLAGS_UBSAN)) $(filter -fno-%,$(CF= LAGS_UBSAN)) =20 # Reset UBSAN_FLAGS in cases where an objects has another one as prerequis= ite -$(noubsan-y) $(filter %.init.o, $(obj-y) $(obj-bin-y) $(extra-y)): \ +$(noubsan-y) $(filter %.init.o, $(obj-y) $(obj-bin-y) $(extra-y) $(lib-y))= : \ UBSAN_FLAGS :=3D =20 $(non-init-objects): _c_flags +=3D $(UBSAN_FLAGS) @@ -273,7 +273,7 @@ define cmd_obj_init_o $(OBJCOPY) $(foreach s,$(SPECIAL_DATA_SECTIONS),--rename-section .$(s)= =3D.init.$(s)) $< $@ endef =20 -$(filter %.init.o,$(obj-y) $(obj-bin-y) $(extra-y)): $(obj)/%.init.o: $(ob= j)/%.o FORCE +$(filter %.init.o,$(obj-y) $(obj-bin-y) $(extra-y) $(lib-y)): $(obj)/%.ini= t.o: $(obj)/%.o FORCE $(call if_changed,obj_init_o) =20 quiet_cmd_cpp_i_c =3D CPP $@ --=20 2.43.0 From nobody Mon Jan 26 07:40:24 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1768902001; cv=pass; d=zohomail.com; s=zohoarc; b=UYVASK3nptGMsbfcPjExuvTjcoU1wlj1MZyZiDchHxJ42t0PGWGVN10fH94J4qywavz/1CTJItrh5Js9jkk3Uac+g97UOL5uO9DqzsQiBiBqRXHZibIXdQKYg5d3n7jCK2HsRJJniu0DmSqEj/l4hkPfIldnJZJVZPG6Zi5uxuM= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1768902001; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=FrP7eMzlU98UJI3/6mC+q5/l7owwMFeEcveAnyG5A9g=; b=kH04zv76W2B2bGugmDnNFBEnqOYIt87HVNZNLP+xmFigPAuQlWmEqjl5XKfB+cdEKddMOW5wll6/dqUkVr6SdRrPeKki2QSRPlsZACDVgxdDxloP+ye8jxYgpsjdNT6QsAD01+97xJjr5GlwEJeEsT8EwZc+wZhBfa4CP+ThQl4= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1768902001881439.7963863038492; Tue, 20 Jan 2026 01:40:01 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1208501.1520667 (Exim 4.92) (envelope-from ) id 1vi8D9-0001NP-Va; Tue, 20 Jan 2026 09:39:43 +0000 Received: by outflank-mailman (output) from mailman id 1208501.1520667; Tue, 20 Jan 2026 09:39:43 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8D9-0001NI-SK; Tue, 20 Jan 2026 09:39:43 +0000 Received: by outflank-mailman (input) for mailman id 1208501; Tue, 20 Jan 2026 09:39:42 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8D8-00018d-13 for xen-devel@lists.xenproject.org; Tue, 20 Jan 2026 09:39:42 +0000 Received: from DM1PR04CU001.outbound.protection.outlook.com (mail-centralusazlp170100005.outbound.protection.outlook.com [2a01:111:f403:c111::5]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id f1a88de7-f5e3-11f0-b15e-2bf370ae4941; Tue, 20 Jan 2026 10:39:41 +0100 (CET) Received: from SN6PR05CA0002.namprd05.prod.outlook.com (2603:10b6:805:de::15) by PH0PR12MB999113.namprd12.prod.outlook.com (2603:10b6:510:38f::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9520.13; Tue, 20 Jan 2026 09:39:37 +0000 Received: from SN1PEPF0002BA52.namprd03.prod.outlook.com (2603:10b6:805:de:cafe::d4) by SN6PR05CA0002.outlook.office365.com (2603:10b6:805:de::15) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9542.9 via Frontend Transport; Tue, 20 Jan 2026 09:39:38 +0000 Received: from satlexmb07.amd.com (165.204.84.17) by SN1PEPF0002BA52.mail.protection.outlook.com (10.167.242.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.4 via Frontend Transport; Tue, 20 Jan 2026 09:39:36 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Tue, 20 Jan 2026 03:39:33 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f1a88de7-f5e3-11f0-b15e-2bf370ae4941 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=HVMs8HfaZ99SakjTfkmAlts9+k93IpFM+h6bV07kMMGcqHoTK5p0T348/2Q4xjF+FzjtaCNm1z7oLUboua4lovxnONm+Vwsc/f/dZ1bJm4eQh2EjDwaEYW6PX1U1ifBWWQXXBxdEkqisxM6h0z//CIN2mGYluCS5NPyA+Od6cuuoGNYDrRZeNFa3DEhX9i8AAsDgXtpHJM6hnHLdIoUiRxzq79HgncrU7JD+p4pCZxd5N4XzD96sN3L4ZVgh/pUK2FfWqVRpxIKavlvQqUDsLyKmEPUbD/BNn5nD0mpGcnIbUZaeTubPqZ0Hn8ZKjmYSorxz6joqTqPCZzJtzDFaXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=FrP7eMzlU98UJI3/6mC+q5/l7owwMFeEcveAnyG5A9g=; b=lZd/WlmmsF5pZff4PJ5BIqGqnTCKLth5S12og3oMn5H6w43W6OU86p7twMZDspkLayVLoKscIKIj4/V7AVJvsgatao34WfDLy0GCNkAzXqe0RbIaJthkB6hyMNy2Acf0YL1H8zrclEcirWw4oMGMRY08adGPM9H8LJ0sgQd0WdU175mYyWNHWkhriVlMXkNK81P0I23IP8Qwoyb15fNgll5HmMFzMxxDeSmWJfaozioLkpQ0fLnMiwz71KsClQLiIK22zhEGcmgcs80k4VeiK6Ugi4jIcmEi7Pc+lQZGrs3LjhJlwdvB7Im3LgCn9jSBudsN66PplbrJMqWVmICwyQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FrP7eMzlU98UJI3/6mC+q5/l7owwMFeEcveAnyG5A9g=; b=AC3aTi4863sG+p+8GmmJn3s4LFX/+s/sULqEmuksxzdHYw8dqo9A2W+WqgTHBszno71bw3uS1gt/05sZ5fDRkYQ+Jc7odnfWb64GJohZuiXMj3RlMjEtPprNiAQs7j6Aav8WNM+pWb8Pvh0i/KbUdY1WCvJNUGTBtE0GJk/Js+A= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , "Julien Grall" , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini Subject: [PATCH v4 3/5] earlycpio: lib-ify earlycpio.c Date: Tue, 20 Jan 2026 10:38:48 +0100 Message-ID: <20260120093852.2380-4-alejandro.garciavallejo@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> References: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: satlexmb08.amd.com (10.181.42.217) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF0002BA52:EE_|PH0PR12MB999113:EE_ X-MS-Office365-Filtering-Correlation-Id: 6e9521fa-ebb4-4401-2eb2-08de5807d32b X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|376014|1800799024|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?Yym73SRnm92MLJz9FTQra9nmDvySZ+dOtOMrm5fQsK++sUCpqLvHdg3QhKF+?= =?us-ascii?Q?oNy/W+VQsRlYbLB1mcGUTtAQCGUuvmJfqcQVLuKChOyd77dEq36Ux6Ui8QMY?= =?us-ascii?Q?X5KGWpI2mpmENdL4XeTOzUuQ+dH0DifboLVAyNTLl/iL209ePpyMljm1/0Lo?= =?us-ascii?Q?W+/o/WvqF1Rv3A2b4Mv6RuyarhbCxC3fH0hvCrKkSOBAdN8AE0ztzbkwGc8J?= =?us-ascii?Q?SnS+bGpOEvnCPp9pZ3wny47tpNgJR91YlfR/UZk5vKLGZUWww4CIeNElNbL8?= =?us-ascii?Q?TObix94ekKS7h73HVsfEYpqhRwTJP42Hnc4kNLC9s6/3JDRVk5IrRZzD65+j?= =?us-ascii?Q?iFEAS2uKvkV3V1JiNBjXavQ6QUV+8IbNJKmj0TIk2XpkRZt0gw9ZwR+3a9yx?= =?us-ascii?Q?HsGRXhvEgIXwQyUhhksjZVTGOvr+pvVQsixrDVeMkdQTZr/NjtHRv8WVj8wq?= =?us-ascii?Q?Rldjy+BRj7I3LBDvFVBSTLG9jbqfWgVlZv5RKJFAk5AQ9Vu6QLyl1qsypuJy?= =?us-ascii?Q?LvaqEVSsXIXJ8OitGFsV++xQvPDsWag8CJZzC9zovZ8+99gI13IX+JnDUjtv?= =?us-ascii?Q?HpNqKLoN3TJI/FVHLxIHOel/GzIyPAzOTucfvkJzZMr2yMwMyMxLBoV1Hl7T?= =?us-ascii?Q?lIpHBtNpGig+SugIXRxyHJSp4LLOedt7esbzLpsRO8qseHYwra0sXevRvCBh?= =?us-ascii?Q?S9W3I2lCIRyJCA/AnPd+pPIxpUB2G0+0I7B3QX4rX0RibfEdG20sZJvu7hpR?= =?us-ascii?Q?CslWczaCUzAJiANbN6pctmLPUMsm5muPcb8uGToGFL7xcSWKXFupgQ5rap1A?= =?us-ascii?Q?AfqFsogNLJoYOVokxI3Ugb6wEAxxz04UYD81AROKrihpPcH7LDwvXH2XZ32m?= =?us-ascii?Q?kuvDQfyqgGfQc7bsEMYm5lOOCtH1CkUWOB8CF4xRoh2Q8r26BmQwqo4VcDkP?= =?us-ascii?Q?u+PYHol+q+2p8IMi+6dPF6sGAjG5D51f1XRUp909qzilwwRVkBCZjGWCK6Kq?= =?us-ascii?Q?yi7eVZ8UTzSt57fsTkbOWabAGLTikuQzRoHqYCfXhLuEYduDSctZ1/7kJ1Nc?= =?us-ascii?Q?eREo20h2bAoUnSUfuwCMrNk5f2PjT0xGOlETm6+/N6mZNUu0TWGePjdCyq8K?= =?us-ascii?Q?/NX+rumOX6gIvWkc7x/fHhMw5sTJTxDYiggG8DM3vll/twN1b+Y3HyWXdHNX?= =?us-ascii?Q?Kwf7txEh/8LIHkKkbIS+jNR7MJ29ynMXrbGvFDGbYvYSZrT4nYoPswm2qqiE?= =?us-ascii?Q?6cO5P3t7FSeArg9NQ2JWRI6pgZqU6E0iBn23B6MGsf17XYi9GnuIG13PdWNW?= =?us-ascii?Q?7rZbjeiYyIpZ8ebhCYeafTdhEXq72nTkcXc/lElpz9yvnzx3rbPpeLmPqCwQ?= =?us-ascii?Q?NTY7YVm4MJdgvTbkWagb/nW0VW4c6vlojrT/PY6bhakYuPLJTZG8N8t1Y7/3?= =?us-ascii?Q?HcLAS+m4QdRd4xlHGyTu1VnLTgncI4KZ3p4j5j9c8GjezhrHMWwjUMxf/i/D?= =?us-ascii?Q?1AvI/fC4ewo1U/tRTK0jb3apUXE/U/B04reWMIzniygtaqvC/nLGFuXB/S72?= =?us-ascii?Q?ucEftGY1RTHmWtlRuUjd8iiz0pzNTN6mAqVYMqAUV1QtFkVJKjS2RgqW7o5q?= =?us-ascii?Q?g2scKDSsMbXHbdnc/QEzuOBnUTqfTOS+K/1Jtg5b+ljAImvcJnbD2IbyUCAw?= =?us-ascii?Q?p/GG+Q=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(376014)(1800799024)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jan 2026 09:39:36.3395 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 6e9521fa-ebb4-4401-2eb2-08de5807d32b X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF0002BA52.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR12MB999113 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1768902002405158500 Content-Type: text/plain; charset="utf-8" It's only used for microcode loading on x86. By lib-ifying it we can make it go away automatically when microcode loading becomes an optional feature in follow-up patches. Signed-off-by: Alejandro Vallejo Acked-by: Andrew Cooper --- v4: * Makes the lib-y target init-only --- xen/common/Makefile | 2 +- xen/lib/Makefile | 1 + xen/{common =3D> lib}/earlycpio.c | 0 3 files changed, 2 insertions(+), 1 deletion(-) rename xen/{common =3D> lib}/earlycpio.c (100%) diff --git a/xen/common/Makefile b/xen/common/Makefile index 92c97d641e..4fc0c15088 100644 --- a/xen/common/Makefile +++ b/xen/common/Makefile @@ -65,7 +65,7 @@ obj-y +=3D wait.o obj-bin-y +=3D warning.init.o obj-y +=3D xmalloc_tlsf.o =20 -obj-bin-$(CONFIG_X86) +=3D $(foreach n,decompress bunzip2 unxz unlzma lzo = unlzo unlz4 unzstd earlycpio,$(n).init.o) +obj-bin-$(CONFIG_X86) +=3D $(foreach n,decompress bunzip2 unxz unlzma lzo = unlzo unlz4 unzstd,$(n).init.o) =20 obj-$(CONFIG_COMPAT) +=3D $(addprefix compat/,domain.o memory.o multicall.= o xlat.o) =20 diff --git a/xen/lib/Makefile b/xen/lib/Makefile index efca830d92..3b0137902c 100644 --- a/xen/lib/Makefile +++ b/xen/lib/Makefile @@ -3,6 +3,7 @@ obj-$(CONFIG_X86) +=3D x86/ lib-y +=3D bsearch.o lib-y +=3D ctors.o lib-y +=3D ctype.o +lib-y +=3D earlycpio.init.o lib-y +=3D find-next-bit.o lib-y +=3D generic-ffsl.o lib-y +=3D generic-flsl.o diff --git a/xen/common/earlycpio.c b/xen/lib/earlycpio.c similarity index 100% rename from xen/common/earlycpio.c rename to xen/lib/earlycpio.c --=20 2.43.0 From nobody Mon Jan 26 07:40:24 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1768902003; cv=pass; d=zohomail.com; s=zohoarc; b=PF0y2tPu5OtIRViX9Kqtrk4Uq/DdHp58RO74A6e5sMwpiL78ldziDzlAT8rnFRFGk1EKs/bT8Yx4KqE8cIidgLyd+HcwbEuTHfJOU064zY+gwN17t8iDCxfhlMcFexN+DpVfatEiPFnrRZJAMKspLAmPCQs1WuOqlZ24LDK1a/E= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1768902003; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Zf2eRnQIuwJBbc97LjKnM7yuRHPy483HO3xHLUQdgl8=; b=BE2PG2N5lwKzawgYAeuo2RGTeHBqG5Hc441WHobv97nw10X9nt9imxa6zTYCOFvxYcvj/d34HUcBhE/nhyLHM1kcOZpVUc/7p+5DWAj/PuCF7oyM+C709QcSpWR2efJXzdSFiu/aBKuvb8J93+9P1kj1RUL3OcIOV+QMhu0xTfo= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1768902003719580.8958959159035; Tue, 20 Jan 2026 01:40:03 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1208503.1520682 (Exim 4.92) (envelope-from ) id 1vi8DC-0001g1-Je; Tue, 20 Jan 2026 09:39:46 +0000 Received: by outflank-mailman (output) from mailman id 1208503.1520682; Tue, 20 Jan 2026 09:39:46 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8DC-0001eO-CY; Tue, 20 Jan 2026 09:39:46 +0000 Received: by outflank-mailman (input) for mailman id 1208503; Tue, 20 Jan 2026 09:39:44 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8DA-00018d-ME for xen-devel@lists.xenproject.org; Tue, 20 Jan 2026 09:39:44 +0000 Received: from BYAPR05CU005.outbound.protection.outlook.com (mail-westusazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c000::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id f2befd7e-f5e3-11f0-b15e-2bf370ae4941; Tue, 20 Jan 2026 10:39:44 +0100 (CET) Received: from SA9PR11CA0025.namprd11.prod.outlook.com (2603:10b6:806:6e::30) by CYYPR12MB8964.namprd12.prod.outlook.com (2603:10b6:930:bc::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9520.12; Tue, 20 Jan 2026 09:39:39 +0000 Received: from SN1PEPF0002BA4B.namprd03.prod.outlook.com (2603:10b6:806:6e:cafe::ed) by SA9PR11CA0025.outlook.office365.com (2603:10b6:806:6e::30) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9520.11 via Frontend Transport; Tue, 20 Jan 2026 09:39:11 +0000 Received: from satlexmb07.amd.com (165.204.84.17) by SN1PEPF0002BA4B.mail.protection.outlook.com (10.167.242.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.4 via Frontend Transport; Tue, 20 Jan 2026 09:39:38 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Tue, 20 Jan 2026 03:39:35 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f2befd7e-f5e3-11f0-b15e-2bf370ae4941 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=V5NMX1xnixxWayE76remcjpt71HDW8/LcsPnN3dKvHYmsYYE3dh1zmOZH8iMIzhUMOxdRJHGYVxXWYzsU/XxYTVq9sMYEiI6+OuWrBg1BOyn/doy+Gkb1/ONtiTTQywirF7UFA6WR3Ms3s0ZhozuAD6ZV4ldmq5wwR+GB0pNYltwqElPmVN1lYWt/9JpqvEr+58r5divHpDGmGfCxBO/Ez3IFJzQ+M6f33zF+ueE6eOAilfybo5k3JteGe/Q2k0pqNjDveULJzZH15byidWKK3O4Q+C7NisvpEZiAHsR3mbLAAUMOSeXi+RgE+JDUq+P7XI6vCp0RSsTLJd5fDby8Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Zf2eRnQIuwJBbc97LjKnM7yuRHPy483HO3xHLUQdgl8=; b=TBZknqjaYeSwZ80AU5KI4NA70Rel4niwqDBghzkZhZYO62zCt5M/Bq/+GDyIt4GGmvDJr7qs4hzEOFtXeS/UDNDkWLzOZL0/6y0t9Aw398V0icI0HuF9hITnXCw6H2p7LH3HUtCTAky8fk7ZO+b8eH1bZhNqKzDefjvE2EHAsJsqsPFzUi/jgUfpqChSUV2uHd9OUYkFwZIqxetKisVVeJV4CnqCh/Ej3H3lPpwkYK02DhA6fgGEwcgu+Ru82C3kDhP212VtgKjV/AHsAaPbV2czKC8RTPODYbUX7u7w0kc7GhzUiYUNuIPn2S58kGnFydPryH7gP+3GJHOBBfcVTA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Zf2eRnQIuwJBbc97LjKnM7yuRHPy483HO3xHLUQdgl8=; b=OruciJ9/8OkKTbbXD0Uvw00MvrWkgvlt17S6UC+z19IYutFXb0qEj6Va6DFb+W8eq6BORArIdLJyagdDTpor3mkta6v4StltzPv23pSnn6cPkZXH4U3eUhuS+avDka0SZqY1EVLvE1dgUIpJpqtiyblszZJIYKipXcJiqEt3pww= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Andrew Cooper , Anthony PERARD , Michal Orzel , Jan Beulich , "Julien Grall" , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= , Stefano Stabellini Subject: [PATCH v4 4/5] docs/misra: Remove earlycpio.c from the Eclair exclusion list. Date: Tue, 20 Jan 2026 10:38:49 +0100 Message-ID: <20260120093852.2380-5-alejandro.garciavallejo@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> References: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: satlexmb08.amd.com (10.181.42.217) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF0002BA4B:EE_|CYYPR12MB8964:EE_ X-MS-Office365-Filtering-Correlation-Id: 990ea3d9-9690-4cfc-b9f5-08de5807d45c X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|376014|1800799024|36860700013; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?WCOgcKAOaHBANW35uwwUeAfvGf2eUB2iHoBaQyNByRDGpVJOIxA1WoB2EeF+?= =?us-ascii?Q?VH2cXESU/1JleBTtMQ0LPZjTAQ3/YI1tCKn1f0lIn28KyDkMvIE6HZxTQf4f?= =?us-ascii?Q?rMt66TtRGwk2o0nEkb/6YVza+aMl+A1oQeS7DUPSDdH6Mim7R6bZKybK+M6Y?= =?us-ascii?Q?HVj09h9SFW5AOoOc/tQcDQrrQt8vbwMPtJD+nsA1oYIA0bgrhykzSNzB67AQ?= =?us-ascii?Q?GbPT0smF0Dr0zLeq6SxbJNnbxvsB98MiqSi28ZBbogJJn/Yg+mJuAm5iPoHC?= =?us-ascii?Q?ZLoRxa9favmvbZ5CvoTnWMHP0pibjAFZ6S02zNzrB/HTRfvDNVvXD7BeP1+i?= =?us-ascii?Q?9lVPBCot9xMQ3XTrT0NJ1pxKAw6uW1vwmySNq5OmQnr7utTIqSeY5ulq8SZB?= =?us-ascii?Q?tr4oFcKb9GX2um0IWOvLumqHwe0FxELZNDDtp+2dPsIxCThYYhudUJGS7TFj?= =?us-ascii?Q?LRXCa+pqg/z1KF7i77sJWC6lx85ikxojpc4BqclX4spmS47KWngY8UydMFHl?= =?us-ascii?Q?mwNdhIWMfxESiW8cI+nFLdZwnzZoKCsoWOD6YyxMXJYceWAGruw+dS51r/Dc?= =?us-ascii?Q?ny7slKtGTSRClEeQvZqcuvpfjE8v47x6Hsmeu/6HQLNMtPrRyWCHNVCQ1ppF?= =?us-ascii?Q?3oaI51OGHVP6CeZZkyoMtDLMDBziMskXGH/6grsqUiTb+0NXfOybA6RJv3H5?= =?us-ascii?Q?KiBIra/xjJ2GFEX4MNP8Q5Bdu7617AK5Ly27prm2hBqZ32cdgM/7nh+nYW/R?= =?us-ascii?Q?XXIMziZUpzZMkD4cjrJQb+ZAhQDaXYXdqRU1odHNyWZC9b29uNebFAjk/NK1?= =?us-ascii?Q?+NLFVfcnjFg9BBodSsqlrZZowv2A9zKkHz0QXSgOpUkOhbBQJigYTYqbjoKW?= =?us-ascii?Q?I67KT8lfjkTExBwcU5ePaE2DO8TtDNbWs7XNHRZ8dYBIe83Es5oSP3jdxyci?= =?us-ascii?Q?wOcgF0HPvVMRRDCD237Kufvu8bdglSNfP+BheT9Otl+CSphnUt5RhZIzdrw+?= =?us-ascii?Q?CswLVscWuFZvjbVokYyujuDjQ5A8+JL2X/PiuQTss5HX7gCpfqNrIcY3EfjX?= =?us-ascii?Q?eWGQZh3oarpETM0batH6kA0o0qcoMHWsbuq1NAeZvUj1JA9pVmU48Slaia3r?= =?us-ascii?Q?5kIvikuQ9MxDvYd+vTiX+HE1sVosfbdTUKovDG7nHQ6QXwt9H6rGeRn2mgWq?= =?us-ascii?Q?HgRZSWRUKhw2S8E7MosYaQCisB9yaEaApTSgLCn4c3Hux/DZcjDGIYOk1XkJ?= =?us-ascii?Q?C7NusFazyWJskyjy5BdRvjAENp6c1m4mu7LbofcSjsUeubbNvGwVHKIFkuow?= =?us-ascii?Q?oTDYFvYugVBxgSvP044keexFNW/Xfb0CTjdWXu/evY+Sbrh3MHFIXkLQNkg1?= =?us-ascii?Q?Th55iDhhJh0+MHXugrn2lItyI33jiWHu8VYugVcbCPLUFoYXG6TBzYgcfrk9?= =?us-ascii?Q?t4n3QfH1z0Q5YLFSpp4zgDMIQC25JSXE0T51lHqWjGXW0HIP4RoTrxlS0bU/?= =?us-ascii?Q?IHPHaBGcjhX95uknCPfeFEi7YqEDPYzaoIRwXYraY7pJcdfrvkAB8A/5lnDZ?= =?us-ascii?Q?osYiLOMydyrFF8Nev99uKOeEXDnzvXD82Qd72rXBkPQky21Az1e9LPFFnvpT?= =?us-ascii?Q?qgUdzKUz7bVysjF+LlxZLze0z8W4+99+fzaFO8ooLqbAsOwSzfGtxuU399l2?= =?us-ascii?Q?/GCYuQ=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(376014)(1800799024)(36860700013);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jan 2026 09:39:38.3398 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 990ea3d9-9690-4cfc-b9f5-08de5807d45c X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF0002BA4B.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CYYPR12MB8964 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1768902004072158500 Content-Type: text/plain; charset="utf-8" It's clean. Signed-off-by: Alejandro Vallejo Reviewed-by: Nicola Vetrini --- docs/misra/exclude-list.json | 4 ---- 1 file changed, 4 deletions(-) diff --git a/docs/misra/exclude-list.json b/docs/misra/exclude-list.json index 388397dd3b..273e24db4a 100644 --- a/docs/misra/exclude-list.json +++ b/docs/misra/exclude-list.json @@ -121,10 +121,6 @@ "rel_path": "common/bunzip2.c", "comment": "Imported from Linux, ignore for now" }, - { - "rel_path": "common/earlycpio.c", - "comment": "Imported from Linux, ignore for now" - }, { "rel_path": "common/gzip/*", "comment": "Imported from Linux, ignore for now" --=20 2.43.0 From nobody Mon Jan 26 07:40:24 2026 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass(p=quarantine dis=none) header.from=amd.com ARC-Seal: i=2; a=rsa-sha256; t=1768902010; cv=pass; d=zohomail.com; s=zohoarc; b=hGpB9tIDptra9Z3Lj0M8emcZ0wktAH1gISIwd5yD8V+EGn3L5cBrJkXqdjhhvl/9aIkB26xv89Erxk9cCIrd6tzyAfse7pC0Bo44VfJ0T+pjUbKSUvucGupR9dF7lYvGAN7eFb0e2vfVyLqnrVHof4iks6Dy1iE/VlVV/YOlwgM= ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1768902010; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=cQefSA2WZMHjaT2qx78VZVCjljpc/SfUnwaK++kIFs8=; b=aeJrz4SwmGbzCYHiIc9WkIN1wBYlqz2lJpmB6ORPRnz6XHT1ZBeLny4vaE5aGcpCKVfz8n0XeL4hf1nIVGLGlcNw9s+w2mZHgdclqhglC8DLb5J2EnBizK9pa1KzSmCoWGA8xCU9gI2Aqc8VZop+A47Bf+WdFKn9VjddC3SZIPk= ARC-Authentication-Results: i=2; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; arc=pass (i=1 dmarc=pass fromdomain=amd.com); dmarc=pass header.from= (p=quarantine dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1768902010301546.1727347937843; Tue, 20 Jan 2026 01:40:10 -0800 (PST) Received: from list by lists.xenproject.org with outflank-mailman.1208502.1520677 (Exim 4.92) (envelope-from ) id 1vi8DC-0001ce-7c; Tue, 20 Jan 2026 09:39:46 +0000 Received: by outflank-mailman (output) from mailman id 1208502.1520677; Tue, 20 Jan 2026 09:39:46 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8DC-0001cT-2f; Tue, 20 Jan 2026 09:39:46 +0000 Received: by outflank-mailman (input) for mailman id 1208502; Tue, 20 Jan 2026 09:39:44 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1vi8DA-00018d-5y for xen-devel@lists.xenproject.org; Tue, 20 Jan 2026 09:39:44 +0000 Received: from CH1PR05CU001.outbound.protection.outlook.com (mail-northcentralusazlp170100001.outbound.protection.outlook.com [2a01:111:f403:c105::1]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id f2aaf39e-f5e3-11f0-b15e-2bf370ae4941; Tue, 20 Jan 2026 10:39:43 +0100 (CET) Received: from SA9PR11CA0008.namprd11.prod.outlook.com (2603:10b6:806:6e::13) by IA1PR12MB9468.namprd12.prod.outlook.com (2603:10b6:208:596::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9520.12; Tue, 20 Jan 2026 09:39:39 +0000 Received: from SN1PEPF0002BA4B.namprd03.prod.outlook.com (2603:10b6:806:6e:cafe::ab) by SA9PR11CA0008.outlook.office365.com (2603:10b6:806:6e::13) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.9520.11 via Frontend Transport; Tue, 20 Jan 2026 09:39:17 +0000 Received: from satlexmb07.amd.com (165.204.84.17) by SN1PEPF0002BA4B.mail.protection.outlook.com (10.167.242.68) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9542.4 via Frontend Transport; Tue, 20 Jan 2026 09:39:39 +0000 Received: from xcbagarciav01.xilinx.com (10.180.168.240) by satlexmb07.amd.com (10.181.42.216) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.2562.17; Tue, 20 Jan 2026 03:39:38 -0600 X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: f2aaf39e-f5e3-11f0-b15e-2bf370ae4941 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=htC+sJj6Cmsp4Hp2NUbcaGay/tkGty6VehoB7XwVge+ojzdZqYiGUuoLTC4r9jwRxbkH6Oug7PlCXWXy2SQ4BvjmbKPQrFKqm1FSqXBDzk/oYkE5/PT3DptfGpySgyS7D3cRAy50uPQ0KePZC1LCcyBam+HiZdBL1whNBgd6KRQvlPA5QsTe1UvDP+my+oEoCqITPpA/Fv0ZvUgM3IFeSQoHbg5hfemtqDFEyLcAna7bjk07PvE2EZ2HgZI2AaEtKNVeVJ6kceRS+fCP1srKjMyXSvUxDD4AQW98tJZJtkIPkl3FtjsUgpKLh/2730mOetYKZclOA/MyERyKajuPYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cQefSA2WZMHjaT2qx78VZVCjljpc/SfUnwaK++kIFs8=; b=S8M0N4qTbkgwT4fhKBm6vsY9ztenbz7LUanotY+yophbb9Q33KUEW9tY13tXRetUQTAIaxv8zCTCUqc0j4ClXzx9g3Ea/OgPqeVqr3VetoFiiiOsQ3WD3yfggkqbKydBsGWJ4M8T4nR8meRyhc4YZBUrT58FckKRfRg+EqE5jQBvW0hci2+2saAbHkGT270qsIWYg5CTcmLmdzt4U6+OwzMoTU2OZTmfyoQK+eTiHNBYUMFzB/riIWE0Ak8MSehOR2pa/NkQJqzF51R28Ls7t9OFNBSNZv5Hn2qfaDkKIJNXYdRp9UgOjMOTcR24b4glsxyjdMbBCMpik7ooHsN1ug== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=cQefSA2WZMHjaT2qx78VZVCjljpc/SfUnwaK++kIFs8=; b=KAzzK0SSEO9n1U3tw7CiTyODKTm6uGxN7/iAYclxNxuYjnvoftB4NTpy30QwOL91kcYTsHesljCNroMLsmsWYxreXOAWvM2B2JV8pUW0KDjAuvMHxWiWCUMdsWog7Vixq1uB9fsT3eWfmVpe3Bcz3sP/QEXMntRryQRm5K0zElM= X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=satlexmb07.amd.com; pr=C From: Alejandro Vallejo To: CC: Alejandro Vallejo , Doug Goldstein , Stefano Stabellini Subject: [PATCH v4 5/5] automation: Disable ucode loading on AMD's analysis run Date: Tue, 20 Jan 2026 10:38:50 +0100 Message-ID: <20260120093852.2380-6-alejandro.garciavallejo@amd.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> References: <20260120093852.2380-1-alejandro.garciavallejo@amd.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-Originating-IP: [10.180.168.240] X-ClientProxiedBy: satlexmb08.amd.com (10.181.42.217) To satlexmb07.amd.com (10.181.42.216) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF0002BA4B:EE_|IA1PR12MB9468:EE_ X-MS-Office365-Filtering-Correlation-Id: bc0f563f-4085-42c6-19e0-08de5807d528 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|82310400026|1800799024|36860700013|376014; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?dZx7MDoNscdnszO0NZn6VnIQgQ3aySeoNY7AkNQeHcAVWXWVcyYchUgNSaf8?= =?us-ascii?Q?MjNxX8pg064EV4zeY335E74rULsaywKFc6agpfhAQcN1QyTlYpclvmmfTh/y?= =?us-ascii?Q?kltlm2rqgRHVoNnnGigiX9SAHkIsdmg4VUdV2gC13LekqPovQ7ITAtOcaNf2?= =?us-ascii?Q?0Sr9W+V3yIxOeLQWxgqdeQYF0TCWbuMg4GJIGtt6QEJEF6VibfaZk3FcN+y2?= =?us-ascii?Q?yHeo3EXtDRuxd0Pwhdnm6MFh9r7qvEcpZhz10jZFLn04W96ssnhWziCXNSAD?= =?us-ascii?Q?FTa46NNKfaHuuEI6D1E7MUWW2/TdQkl+8ulc+FY4ZblBGLcDkDUuoDoDHEIe?= =?us-ascii?Q?rnsu9aRDEIonpg4r7WOdXT9XXSXa1Hteo/W8IjYZLXLzbpZhMVnnAuuVaKcV?= =?us-ascii?Q?l4vE8Vll3/pUHT1ktEa3aD9h6GBcZ5+5hcQo8bZNlN0tKj+GTQd12tfykbwx?= =?us-ascii?Q?Dl0h0GvtXRAw4Jga/g4Cg4UgwtLNgTEN8R9O94rjm3Pkmf/6VKt1JAiRFc1c?= =?us-ascii?Q?jgxvGPOtrqgXO+1jTTZ4FwV7GAkoFdAnhlKELt/uz0DFslQoK2UK+1zoo1jA?= =?us-ascii?Q?CCHbJ5xUX8syb1/W0cyVquzP6aoFLOwFCka8LWkEv2lAgsinjwZ4yhGrelyQ?= =?us-ascii?Q?B2aE2ZUJw1vLfr+Javx0ZpzfNkSQYO++6ECX7OPcklEJEhErg9ed6/KbwYbY?= =?us-ascii?Q?O9tsRYqgW9jLm/93aFyQi63RE9JvgWKvNY7hXE9sJrY3hmHV/XtrQRmy9Crz?= =?us-ascii?Q?KWCVj22WABF1t4CFxOSBfVeSfFmFoQnVruSevrfYgz0EyY8TEkBm3ww0Kgf6?= =?us-ascii?Q?eGc9BcjvIR73s6Uxh4PwhdemVOtws+kawoQdiIuWUbGMdLQViMxFmkDs/JNT?= =?us-ascii?Q?KNHK1FfVCn983/GKLi1gVuH9vETP4kSYH2Ym44YB14dAiv+Rb16WAX6Ei3Y3?= =?us-ascii?Q?BiRRPv/ZABAVZrFFVvCjcAK8pwgfwbvJmvwz6dsj/Y413Zxmb6ToSeZpkucP?= =?us-ascii?Q?RrFSPiuSmpnMJg6fOK9HIh1YVndY5vw3rpXW9Xu/4HvtHLJc6/0zGq7ugvIb?= =?us-ascii?Q?MLRvHQtV14fMXVx2DBBuh03NEbjnJOCNkrrSagLP3Itlk8ZHvnwGpZhfkYGi?= =?us-ascii?Q?mqiEuD/9qBTz1/xOC8/8rHJ3fSw5sGFmcYbyEwi9vn9gEvcCKEs6DdkzI6xk?= =?us-ascii?Q?9fTVEqwIXf0E1P2fE/ARn0XerWi8Rb2ebOW16JKOOD7yFsoRiOeaaSn+wCEn?= =?us-ascii?Q?z1RwanBfjcAdTL2E5qPl6/OQGT49jF69ljpVV40rl/1IkgrGJAk/8RsxgxqO?= =?us-ascii?Q?cQsykEdMuVtc3+zl1VACOusq4kSYrhHeT+rJV9HSso+e6KvlVhdbJnKPkUgm?= =?us-ascii?Q?XW6X3Y8lJhQWqlElO2gx2fTV+Sy1hby1DMxzP7s68lN1YbasPmmdv4gIuqUT?= =?us-ascii?Q?QZU8DYxT3U+aluHFWY3kNdwvoeA4CPvr+WedHIS5I6/ZXhCzWle2lhTl344Q?= =?us-ascii?Q?S2g/0jKro+CU5J7vEWkLDZNs5wz3HAC4a/oxCXfWu+vxgShSlfE/GtianJ8F?= =?us-ascii?Q?fbT4Eh1NEjCbuVEnERNySbn7JCeErhCRgoOk8OltXIGhihe65FsiRxmiTOay?= =?us-ascii?Q?H2PDVyHbFr9gGIwe0Z1h4jjuzmuv6NLAhtbPewW3U4FovUVO0iSbeLgBmJfU?= =?us-ascii?Q?GEzgKQ=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:satlexmb07.amd.com;PTR:InfoDomainNonexistent;CAT:NONE;SFS:(13230040)(82310400026)(1800799024)(36860700013)(376014);DIR:OUT;SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 20 Jan 2026 09:39:39.6648 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: bc0f563f-4085-42c6-19e0-08de5807d528 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d;Ip=[165.204.84.17];Helo=[satlexmb07.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF0002BA4B.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA1PR12MB9468 X-ZohoMail-DKIM: pass (identity @amd.com) X-ZM-MESSAGEID: 1768902012138158500 Content-Type: text/plain; charset="utf-8" Explicitly set CONFIG_MICROCODE_LOADING=3Dn Signed-off-by: Alejandro Vallejo Acked-by: Andrew Cooper --- automation/gitlab-ci/analyze.yaml | 1 + 1 file changed, 1 insertion(+) diff --git a/automation/gitlab-ci/analyze.yaml b/automation/gitlab-ci/analy= ze.yaml index a472692fcb..b3395e2da7 100644 --- a/automation/gitlab-ci/analyze.yaml +++ b/automation/gitlab-ci/analyze.yaml @@ -93,6 +93,7 @@ eclair-x86_64-amd: CONFIG_DEBUG_LOCKS=3Dn CONFIG_SCRUB_DEBUG=3Dn CONFIG_XMEM_POOL_POISON=3Dn + CONFIG_MICROCODE_LOADING=3Dn rules: - if: $ECLAIR_SAFETY when: always --=20 2.43.0