[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[XTF PATCH v3 0/3] Remove Xen as a hard requirement to run XTF
- To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>
- Date: Mon, 6 Oct 2025 12:25:55 +0200
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Dr/SpR25R6LxwnFP2DHlTHWA9mjTBX2dtfDdenGL0XA=; b=a1EeXMr3/SwYJEn5OIKPo6OhYGKZ8TR6yF4t1LTda+vkuakFlWqVixNFTh6Poy9/g8Ojjr2GANNPjGPS/4R74Bmert5OBeqdyZxqiAOGhAN2TaZPVdHq5hJFx3BuWQWZpTXiEsFi9FtAnwUfVG4JegFQlT8B3i86AxebbQcuXJqjEnecf+rSMQC07aArQxntvqFPra3pC/P7VmFrZRGBunnNVH+Xoeb+QmgI0abmapqMz85nEzS5jL83kYTBq+QJTUABy77S5q84W5sYtb3ztRdc7BzPiQ6ZAh5mebDtkofPrVEb3F3+f9O/RHE2CRSVKE3zkxsoID1mD56zxwCGdA==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TZ5Cz2qcfPPn3KyPO+4YgWckrWtfphKGyOsEf8/WYnDeLa/MtFgyMHq5bdHkHTZvwNRFaNVXt84Ttm1E1+kdQZmF4datHwLn3O8JfYJQyKbHD2J9dmQVxiktHmi7jsmhz2gGVnV8u/VF4hBD0RFRCABxjRSlAmC2+kwt5GsR+jxDwMxf9FQeF/AbBol7xlD62DqhQzC9URfaD3RQsUpgC62uLTceTWVIGYIKzWmI65GKqWN0zzur8ZUz+jZiBRcdX8+JvgWuxXEF+ZKbTCFhMyz4/72W8wFlIfLppi7hlJEDNtZhDw3MR4ieIhlQKku38XBKL2kuQ9oeTjkP6zlV1w==
- Cc: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monne <roger.pau@xxxxxxxxxx>
- Delivery-date: Mon, 06 Oct 2025 10:28:32 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
Hi,
This version includes gating access to the hypercall page on shutdown through
a new `cpu_has_xen` global boolean. I also implemented Rogers' suggestion to
poison the hypercall page with `int3` (opcode 0xcc).
Cheers,
Alejandro
Alejandro Vallejo (3):
x86: Remove Xen as a hard requirement to run XTF.
x86: Allow exiting QEMU in TCG/QEMU
x86: Poison hypercall page with `int3` rather than `ret`
arch/x86/hypercall_page.S | 4 +--
arch/x86/include/arch/cpuid.h | 2 ++
arch/x86/setup.c | 55 +++++++++++++++++++++++++----------
arch/x86/traps.c | 15 ++++++++++
common/lib.c | 2 +-
common/report.c | 8 +++--
include/xtf/framework.h | 3 ++
7 files changed, 68 insertions(+), 21 deletions(-)
base-commit: 453490df6f65fb503a39b1bddf0093441eece9ae
--
2.43.0
|