[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[XTF PATCH v3 0/3] Remove Xen as a hard requirement to run XTF


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>
  • Date: Mon, 6 Oct 2025 12:25:55 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Dr/SpR25R6LxwnFP2DHlTHWA9mjTBX2dtfDdenGL0XA=; b=a1EeXMr3/SwYJEn5OIKPo6OhYGKZ8TR6yF4t1LTda+vkuakFlWqVixNFTh6Poy9/g8Ojjr2GANNPjGPS/4R74Bmert5OBeqdyZxqiAOGhAN2TaZPVdHq5hJFx3BuWQWZpTXiEsFi9FtAnwUfVG4JegFQlT8B3i86AxebbQcuXJqjEnecf+rSMQC07aArQxntvqFPra3pC/P7VmFrZRGBunnNVH+Xoeb+QmgI0abmapqMz85nEzS5jL83kYTBq+QJTUABy77S5q84W5sYtb3ztRdc7BzPiQ6ZAh5mebDtkofPrVEb3F3+f9O/RHE2CRSVKE3zkxsoID1mD56zxwCGdA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TZ5Cz2qcfPPn3KyPO+4YgWckrWtfphKGyOsEf8/WYnDeLa/MtFgyMHq5bdHkHTZvwNRFaNVXt84Ttm1E1+kdQZmF4datHwLn3O8JfYJQyKbHD2J9dmQVxiktHmi7jsmhz2gGVnV8u/VF4hBD0RFRCABxjRSlAmC2+kwt5GsR+jxDwMxf9FQeF/AbBol7xlD62DqhQzC9URfaD3RQsUpgC62uLTceTWVIGYIKzWmI65GKqWN0zzur8ZUz+jZiBRcdX8+JvgWuxXEF+ZKbTCFhMyz4/72W8wFlIfLppi7hlJEDNtZhDw3MR4ieIhlQKku38XBKL2kuQ9oeTjkP6zlV1w==
  • Cc: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Delivery-date: Mon, 06 Oct 2025 10:28:32 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi,

This version includes gating access to the hypercall page on shutdown through
a new `cpu_has_xen` global boolean. I also implemented Rogers' suggestion to
poison the hypercall page with `int3` (opcode 0xcc).

Cheers,
Alejandro

Alejandro Vallejo (3):
  x86: Remove Xen as a hard requirement to run XTF.
  x86: Allow exiting QEMU in TCG/QEMU
  x86: Poison hypercall page with `int3` rather than `ret`

 arch/x86/hypercall_page.S     |  4 +--
 arch/x86/include/arch/cpuid.h |  2 ++
 arch/x86/setup.c              | 55 +++++++++++++++++++++++++----------
 arch/x86/traps.c              | 15 ++++++++++
 common/lib.c                  |  2 +-
 common/report.c               |  8 +++--
 include/xtf/framework.h       |  3 ++
 7 files changed, 68 insertions(+), 21 deletions(-)


base-commit: 453490df6f65fb503a39b1bddf0093441eece9ae
-- 
2.43.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.