Re: [PATCH v6 09/51] i386/xen: handle guest hypercalls

2023-01-16 Thread David Woodhouse
On Mon, 2023-01-16 at 16:24 +, Paul Durrant wrote: > > +    trace_kvm_xen_hypercall(CPU(cpu)->cpu_index, exit->u.hcall.cpl, > > +    exit->u.hcall.input, exit->u.hcall.params[0], > > +    exit->u.hcall.params[1], > > exit->u.hcall.params[2], > >

Re: [PATCH v6 09/51] i386/xen: handle guest hypercalls

2023-01-16 Thread Paul Durrant
On 10/01/2023 12:20, David Woodhouse wrote: From: Joao Martins This means handling the new exit reason for Xen but still crashing on purpose. As we implement each of the hypercalls we will then return the right return code. Signed-off-by: Joao Martins [dwmw2: Add CPL to hypercall tracing,

[PATCH v6 09/51] i386/xen: handle guest hypercalls

2023-01-10 Thread David Woodhouse
From: Joao Martins This means handling the new exit reason for Xen but still crashing on purpose. As we implement each of the hypercalls we will then return the right return code. Signed-off-by: Joao Martins [dwmw2: Add CPL to hypercall tracing, disallow hypercalls from CPL > 0] Signed-off-by: