search for: xcs

Displaying 20 results from an estimated 53 matches for "xcs".

Did you mean: cs
2005 Feb 26
1
[Fwd: [Xen-changelog] Move xcs to unix domain sockets.]
Just forwarding this changelog from yesterday. xcs now uses Unix domain sockets in unstable. This was a hot thread a couple months back with strong opinions on both sides and no clear resolution on the list, so I thought some people might like to know the developers'' resolution. This should be good news for those seeking tighter dom0...
2005 May 30
24
stable / unstable parallel install?
Hi, Is there some easy way to install both 2.x and unstable xen tools at the same machine? Seems /usr is hardcoded everythere in the tools Makefiles, looks like there is no easy way to put them to different paths (say, prefix /opt/xen2 and /opt/xen3) :-/ Gerd _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com
2005 Jan 28
3
[PATCH] Daemonize xcs
Currently xcs is run by xend in xen-unstable by simply making it a child process. If you launch xend from an ssh session, the session won''t exit because the xcs still is connected to it''s controlling terminal. xcs should daemonize itself to prevent this from happening. This patch does that a...
2007 Apr 18
2
[patch 3/8] Allow a kernel to not be in ring 0.
...ser-space with LDT SS restore_nocheck: --- 2.6.18-rc3-32.orig/arch/i386/kernel/process.c +++ 2.6.18-rc3-32/arch/i386/kernel/process.c @@ -346,7 +346,7 @@ int kernel_thread(int (*fn)(void *), voi regs.xes = __USER_DS; regs.orig_eax = -1; regs.eip = (unsigned long) kernel_thread_helper; - regs.xcs = __KERNEL_CS; + regs.xcs = __KERNEL_CS | get_kernel_rpl(); regs.eflags = X86_EFLAGS_IF | X86_EFLAGS_SF | X86_EFLAGS_PF | 0x2; /* Ok, create the new process.. */ --- 2.6.18-rc3-32.orig/arch/i386/mm/extable.c +++ 2.6.18-rc3-32/arch/i386/mm/extable.c @@ -11,7 +11,7 @@ int fixup_exception(struct...
2007 Apr 18
2
[patch 3/8] Allow a kernel to not be in ring 0.
...ser-space with LDT SS restore_nocheck: --- 2.6.18-rc3-32.orig/arch/i386/kernel/process.c +++ 2.6.18-rc3-32/arch/i386/kernel/process.c @@ -346,7 +346,7 @@ int kernel_thread(int (*fn)(void *), voi regs.xes = __USER_DS; regs.orig_eax = -1; regs.eip = (unsigned long) kernel_thread_helper; - regs.xcs = __KERNEL_CS; + regs.xcs = __KERNEL_CS | get_kernel_rpl(); regs.eflags = X86_EFLAGS_IF | X86_EFLAGS_SF | X86_EFLAGS_PF | 0x2; /* Ok, create the new process.. */ --- 2.6.18-rc3-32.orig/arch/i386/mm/extable.c +++ 2.6.18-rc3-32/arch/i386/mm/extable.c @@ -11,7 +11,7 @@ int fixup_exception(struct...
2005 Feb 27
2
Re: [Xen-changelog] Move xcs to unix domain sockets.
...t 1.1265, 2005/02/25 22:55:44+00:00, akw27@arcadians.cl.cam.ac.uk > diff -Nru a/tools/misc/xend b/tools/misc/xend > --- a/tools/misc/xend 2005-02-26 06:03:12 -05:00 > +++ b/tools/misc/xend 2005-02-26 06:03:12 -05:00 > @@ -24,7 +24,7 @@ > import socket > import time > > -XCS_PORT = 1633 > +XCS_PATH = "/var/xen/xcs_socket" Didn''t the other tools have everything in /var/lib/xen ? -- "Debugging is twice as hard as writing the code in the first place. Therefore, if you write the code as cleverly as possible, you are, by definition, not smart e...
2007 Apr 18
1
[PATCH 2/12] ldt-accessors
...t *addr = NULL; - unsigned long *lp; /* We're in an interrupt, but this is clear and BUG()-safe. */ preempt_disable(); /* Check if the application is using LDT entry for its code segment and * calculate the address by reading the base address from the LDT entry. */ - if ((regs->xcs & 4) && (current->mm)) { - lp = (unsigned long *) ((unsigned long)((regs->xcs >> 3) * 8) - + (char *) current->mm->context.ldt); - addr = (kprobe_opcode_t *) (get_desc_base(lp) + regs->eip - + if (segment_is_ldt(regs->xcs) && (current->mm)) { +...
2007 Apr 18
1
[PATCH 2/12] ldt-accessors
...t *addr = NULL; - unsigned long *lp; /* We're in an interrupt, but this is clear and BUG()-safe. */ preempt_disable(); /* Check if the application is using LDT entry for its code segment and * calculate the address by reading the base address from the LDT entry. */ - if ((regs->xcs & 4) && (current->mm)) { - lp = (unsigned long *) ((unsigned long)((regs->xcs >> 3) * 8) - + (char *) current->mm->context.ldt); - addr = (kprobe_opcode_t *) (get_desc_base(lp) + regs->eip - + if (segment_is_ldt(regs->xcs) && (current->mm)) { +...
2005 Sep 30
14
pdb missing files?
...When I try to build pdb I first get errors because the Makefile is configured to treat warnings as errors, and there are some warnings. I decided to take my chances, and I removed Werror from CFLAGS in tools/debugger/pdb/Makefile. At that point, the build failed because it is unable to find xcs_proto.h. After some googling, it seems this existed in the xen-unstable.hg tree earlier this month. Is the PDB system currently broken? Thanks, -Jon Output of errors from warnings: root:01:20 AM:pdb $ make make[1]: Entering directory `/usr/src/xen-unstable.hg-20050930_orig/tools/debugger/p...
2007 Apr 18
1
[PATCH] Slight cleanups for x86 ring macros (against rc3-mm2)
...4f9b5964 include/asm-i386/ptrace.h --- a/include/asm-i386/ptrace.h Mon Aug 07 13:30:17 2006 +1000 +++ b/include/asm-i386/ptrace.h Mon Aug 07 14:32:11 2006 +1000 @@ -74,11 +74,11 @@ extern void send_sigtrap(struct task_str */ static inline int user_mode(struct pt_regs *regs) { - return (regs->xcs & SEGMENT_RPL_MASK) == 3; + return (regs->xcs & SEGMENT_RPL_MASK) == USER_RPL; } static inline int user_mode_vm(struct pt_regs *regs) { - return (((regs->xcs & SEGMENT_RPL_MASK) | (regs->eflags & VM_MASK)) >= 3); + return ((regs->xcs & SEGMENT_RPL_MASK) | (regs...
2007 Apr 18
1
[PATCH] Slight cleanups for x86 ring macros (against rc3-mm2)
...4f9b5964 include/asm-i386/ptrace.h --- a/include/asm-i386/ptrace.h Mon Aug 07 13:30:17 2006 +1000 +++ b/include/asm-i386/ptrace.h Mon Aug 07 14:32:11 2006 +1000 @@ -74,11 +74,11 @@ extern void send_sigtrap(struct task_str */ static inline int user_mode(struct pt_regs *regs) { - return (regs->xcs & SEGMENT_RPL_MASK) == 3; + return (regs->xcs & SEGMENT_RPL_MASK) == USER_RPL; } static inline int user_mode_vm(struct pt_regs *regs) { - return (((regs->xcs & SEGMENT_RPL_MASK) | (regs->eflags & VM_MASK)) >= 3); + return ((regs->xcs & SEGMENT_RPL_MASK) | (regs...
2007 Apr 18
1
[PATCH 6/14] i386 / Add some segment convenience functions
...-09 19:36:36.000000000 -0700 +++ linux-2.6.13/arch/i386/kernel/kprobes.c 2005-08-10 20:42:20.000000000 -0700 @@ -163,8 +163,8 @@ /* Check if the application is using LDT entry for its code segment and * calculate the address by reading the base address from the LDT entry. */ - if ((regs->xcs & 4) && (current->mm)) { - lp = (unsigned long *) ((unsigned long)((regs->xcs >> 3) * 8) + if (segment_from_ldt(regs->xcs) && (current->mm)) { + lp = (unsigned long *) ((unsigned long)(segment_index(regs->xcs) * 8) + (char *) current->mm->conte...
2007 Apr 18
1
[PATCH 6/14] i386 / Add some segment convenience functions
...-09 19:36:36.000000000 -0700 +++ linux-2.6.13/arch/i386/kernel/kprobes.c 2005-08-10 20:42:20.000000000 -0700 @@ -163,8 +163,8 @@ /* Check if the application is using LDT entry for its code segment and * calculate the address by reading the base address from the LDT entry. */ - if ((regs->xcs & 4) && (current->mm)) { - lp = (unsigned long *) ((unsigned long)((regs->xcs >> 3) * 8) + if (segment_from_ldt(regs->xcs) && (current->mm)) { + lp = (unsigned long *) ((unsigned long)(segment_index(regs->xcs) * 8) + (char *) current->mm->conte...
2007 Apr 18
0
[RFC, PATCH 11/24] i386 Vmi segment changes
...;asm/vm86.h> +#include <asm/segment.h> struct task_struct; extern void send_sigtrap(struct task_struct *tsk, struct pt_regs *regs, int error_code); @@ -73,11 +74,11 @@ extern void send_sigtrap(struct task_str */ static inline int user_mode(struct pt_regs *regs) { - return (regs->xcs & 3) != 0; + return (regs->xcs & SEGMENT_RPL_MASK) == 3; } static inline int user_mode_vm(struct pt_regs *regs) { - return ((regs->xcs & 3) | (regs->eflags & VM_MASK)) != 0; + return (((regs->xcs & SEGMENT_RPL_MASK) | (regs->eflags & VM_MASK)) >= 3); }...
2007 Apr 18
0
[RFC, PATCH 11/24] i386 Vmi segment changes
...;asm/vm86.h> +#include <asm/segment.h> struct task_struct; extern void send_sigtrap(struct task_struct *tsk, struct pt_regs *regs, int error_code); @@ -73,11 +74,11 @@ extern void send_sigtrap(struct task_str */ static inline int user_mode(struct pt_regs *regs) { - return (regs->xcs & 3) != 0; + return (regs->xcs & SEGMENT_RPL_MASK) == 3; } static inline int user_mode_vm(struct pt_regs *regs) { - return ((regs->xcs & 3) | (regs->eflags & VM_MASK)) != 0; + return (((regs->xcs & SEGMENT_RPL_MASK) | (regs->eflags & VM_MASK)) >= 3); }...
2007 Apr 18
1
[PATCH 7/14] i386 / Add some descriptor convenience functions
...=============================================================== --- linux-2.6.13.orig/arch/i386/mm/fault.c 2005-08-09 19:43:47.000000000 -0700 +++ linux-2.6.13/arch/i386/mm/fault.c 2005-08-10 20:42:04.000000000 -0700 @@ -75,7 +75,8 @@ { unsigned long eip = regs->eip; unsigned seg = regs->xcs & 0xffff; - u32 seg_ar, seg_limit, base, *desc; + u32 seg_ar, seg_limit, base; + struct desc_struct *desc; /* The standard kernel/user address space limit. */ *eip_limit = (seg & 3) ? USER_DS.seg : KERNEL_DS.seg; @@ -108,12 +109,12 @@ desc = (void *)desc + (seg & ~7); } else...
2007 Apr 18
1
[PATCH 7/14] i386 / Add some descriptor convenience functions
...=============================================================== --- linux-2.6.13.orig/arch/i386/mm/fault.c 2005-08-09 19:43:47.000000000 -0700 +++ linux-2.6.13/arch/i386/mm/fault.c 2005-08-10 20:42:04.000000000 -0700 @@ -75,7 +75,8 @@ { unsigned long eip = regs->eip; unsigned seg = regs->xcs & 0xffff; - u32 seg_ar, seg_limit, base, *desc; + u32 seg_ar, seg_limit, base; + struct desc_struct *desc; /* The standard kernel/user address space limit. */ *eip_limit = (seg & 3) ? USER_DS.seg : KERNEL_DS.seg; @@ -108,12 +109,12 @@ desc = (void *)desc + (seg & ~7); } else...
2007 Apr 18
8
[patch 0/8] Basic infrastructure patches for a paravirtualized kernel
Hi Andrew, This series of patches lays the basic ground work for the paravirtualized kernel patches coming later on. I think this lot is ready for the rough-and-tumble world of the -mm tree. The main change from the last posting is that all the page-table related patches have been moved out, and will be posted separately. Also, the off-by-one in reserving the top of address space has been
2007 Apr 18
8
[patch 0/8] Basic infrastructure patches for a paravirtualized kernel
Hi Andrew, This series of patches lays the basic ground work for the paravirtualized kernel patches coming later on. I think this lot is ready for the rough-and-tumble world of the -mm tree. The main change from the last posting is that all the page-table related patches have been moved out, and will be posted separately. Also, the off-by-one in reserving the top of address space has been
2007 Apr 18
2
[PATCH 19/21] i386 Kprobes semaphore fix
...eck if the application is using LDT entry for its code segment and - * calculate the address by reading the base address from the LDT entry. + /* + * Getting the address may require getting the LDT semaphore, so + * wait to disable preempt since we may take interrupts here. */ - if ((regs->xcs & 4) && (current->mm)) { - lp = (unsigned long *) ((unsigned long)((regs->xcs >> 3) * 8) - + (char *) current->mm->context.ldt); - addr = (kprobe_opcode_t *) (get_desc_base(lp) + regs->eip - - sizeof(kprobe_opcode_t)); - } else { - addr = (kprobe_opcode_...