Rocksolid Light

Welcome to novaBBS (click a section below)

mail  files  register  newsreader  groups  login

Message-ID:  

Think of your family tonight. Try to crawl home after the computer crashes.


computers / comp.os.vms / Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

SubjectAuthor
* VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Jan-Erik Söderholm
+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
|`- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onDave Froble
+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onRichard Maher
+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
|+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onDave Froble
||`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86John Reagan
|| `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onDave Froble
|`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86John Reagan
| +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onDave Froble
| |`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86John Reagan
| | +- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| | +- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| | `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Mike K.
| |  `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86John Reagan
| |   `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |    +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onJohn Dallman
| |    |`- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |    `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSSingle Stage to Orbit
| |     |+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Ian Miller
| |     |+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     ||+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86John Dallman
| |     ||+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSSingle Stage to Orbit
| |     ||`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onVMSgenerations working group
| |     || +- errata : all about ada is mine. I confused with my function ofGérard Calliet
| |     || `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Ian Miller
| |     |+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86plugh
| |     ||`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     || `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86plugh
| |     ||  `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     ||   `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86plugh
| |     ||    `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| |     ||     `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86plugh
| |     |`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86plugh
| |     | +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     | |`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86plugh
| |     | | `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     | |  `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86plugh
| |     | `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| |     |  `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |   `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| |     |    +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    |+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    ||+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| |     |    |||`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    ||| +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onJohn Dallman
| |     |    ||| |`- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    ||| `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    |||  `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    |||   `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    ||`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    || +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| |     |    || |+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    || ||`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| |     |    || || +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Jake Hamby
| |     |    || || |`- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Jake Hamby
| |     |    || || +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    || || |`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| |     |    || || | +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     |    || || | |+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    || || | ||+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onCraig A. Berry
| |     |    || || | |||+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onhb
| |     |    || || | ||||`- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    || || | |||`- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86John Reagan
| |     |    || || | ||`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     |    || || | || `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onDave Froble
| |     |    || || | ||  `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     |    || || | ||   `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onDave Froble
| |     |    || || | |`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| |     |    || || | | `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     |    || || | +- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    || || | `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    || || |  `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    || || |   +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    || || |   |`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    || || |   | `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onhb
| |     |    || || |   |  +- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86David Jones
| |     |    || || |   |  +- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86John Reagan
| |     |    || || |   |  `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    || || |   |   `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onhb
| |     |    || || |   |    `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    || || |   `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onDave Froble
| |     |    || || |    +* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    || || |    |+* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onDave Froble
| |     |    || || |    ||`- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    || || |    |`- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onJohn Dallman
| |     |    || || |    `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     |    || || |     `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onDave Froble
| |     |    || || |      `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     |    || || +- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     |    || || `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSJohn Dallman
| |     |    || |`- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    || `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Simon Clubley
| |     |    ||  `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    |+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSchris
| |     |    |+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Jake Hamby
| |     |    |`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Jake Hamby
| |     |    | `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Stephen Hoffman
| |     |    `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| |     `* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onArne Vajhøj
| `- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMSSingle Stage to Orbit
+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Ian Miller
+- Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS onAndrew Brehm
`* Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86Rich Jordan

Pages:12345
Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<3680376f-d43c-41af-90c1-8f40b1792929n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22701&group=comp.os.vms#22701

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:ac8:58d6:0:b0:2f3:d35c:4ef8 with SMTP id u22-20020ac858d6000000b002f3d35c4ef8mr23616603qta.265.1652875196799;
Wed, 18 May 2022 04:59:56 -0700 (PDT)
X-Received: by 2002:a05:620a:450e:b0:6a0:268e:e384 with SMTP id
t14-20020a05620a450e00b006a0268ee384mr18921112qkp.245.1652875196628; Wed, 18
May 2022 04:59:56 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 18 May 2022 04:59:56 -0700 (PDT)
In-Reply-To: <t62an4$7e4$1@gioia.aioe.org>
Injection-Info: google-groups.googlegroups.com; posting-host=104.231.150.181; posting-account=CO-_tAoAAACjjs2KLAw3xVKCy6Z_J3VK
NNTP-Posting-Host: 104.231.150.181
References: <t51g33$q73$1@dont-email.me> <62757a46$0$695$14726298@news.sunsite.dk>
<8c93548f-28f7-48f8-9fb9-d023bce7f13dn@googlegroups.com> <51ace26c-f55e-4afb-9bcc-8c3ab92418a0n@googlegroups.com>
<3e156c0b-63aa-453d-86c9-5615076cdb60n@googlegroups.com> <627816cf$0$705$14726298@news.sunsite.dk>
<t5b2vq$4n3$1@dont-email.me> <dad8aa6fa7ed644e9b648ca53b07bad428d2c5cc.camel@munted.eu>
<63e02e62-8e1e-44ee-8434-e3d0cb252d30n@googlegroups.com> <t5f0m6$1ft7$3@gioia.aioe.org>
<627b070a$0$698$14726298@news.sunsite.dk> <t5paer$c29$1@gioia.aioe.org>
<t5pe61$nsg$1@dont-email.me> <6280ff3f$0$707$14726298@news.sunsite.dk>
<t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org>
<62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org>
<t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org>
<62840574$0$698$14726298@news.sunsite.dk> <t611b5$dn9$1@dont-email.me>
<62840cfd$0$705$14726298@news.sunsite.dk> <t61481$29p$1@dont-email.me> <t62an4$7e4$1@gioia.aioe.org>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <3680376f-d43c-41af-90c1-8f40b1792929n@googlegroups.com>
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
From: osuvma...@gmail.com (David Jones)
Injection-Date: Wed, 18 May 2022 11:59:56 +0000
Content-Type: text/plain; charset="UTF-8"
X-Received-Bytes: 2994
 by: David Jones - Wed, 18 May 2022 11:59 UTC

On Wednesday, May 18, 2022 at 4:28:23 AM UTC-4, hb wrote:
> On x86, by default the linker puts code into P2; on request the linker
> can move code into P0. On x86 the function pointer is a code address of
> a single code instruction, which uses a 64 bit address to jump to the
> "real" code. The linker creates this code instruction. On IA64, by
> default the linker puts code into P0; on request, the linker can move
> code into P2. On IA64 the function pointer is the address of a data
> structure, a Function Descriptor (FD), which contains a 64 bit address
> of the "real" code. The linker creates the FD.

My C code often assumes auto storage class variables (i.e. the stack) are in
32-bit space, but I don't recall seeing that explicitly documented anywhere. I
define a macro, RMS_MALLOC, as an alias for _malloc32 since RMS structs
are the main thing I deal with plagued with 32-bit pointers.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<3cb3498a-61cc-4e34-8e4b-7956f176a54fn@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22703&group=comp.os.vms#22703

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:622a:44b:b0:2f3:f495:386b with SMTP id o11-20020a05622a044b00b002f3f495386bmr23750577qtx.349.1652875962847;
Wed, 18 May 2022 05:12:42 -0700 (PDT)
X-Received: by 2002:ac8:5704:0:b0:2f7:3b31:7c7d with SMTP id
4-20020ac85704000000b002f73b317c7dmr16281878qtw.681.1652875962654; Wed, 18
May 2022 05:12:42 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 18 May 2022 05:12:42 -0700 (PDT)
In-Reply-To: <t62dok$1ioj$1@gioia.aioe.org>
Injection-Info: google-groups.googlegroups.com; posting-host=73.60.222.222; posting-account=M3IgSwoAAADJd6EnOmsrCCfB6_OyTOkv
NNTP-Posting-Host: 73.60.222.222
References: <t51g33$q73$1@dont-email.me> <t53327$v1d$1@dont-email.me>
<70477de0-a2e1-4f8e-ac6f-950a6aba3f28n@googlegroups.com> <62757a46$0$695$14726298@news.sunsite.dk>
<8c93548f-28f7-48f8-9fb9-d023bce7f13dn@googlegroups.com> <51ace26c-f55e-4afb-9bcc-8c3ab92418a0n@googlegroups.com>
<3e156c0b-63aa-453d-86c9-5615076cdb60n@googlegroups.com> <627816cf$0$705$14726298@news.sunsite.dk>
<t5b2vq$4n3$1@dont-email.me> <dad8aa6fa7ed644e9b648ca53b07bad428d2c5cc.camel@munted.eu>
<63e02e62-8e1e-44ee-8434-e3d0cb252d30n@googlegroups.com> <t5f0m6$1ft7$3@gioia.aioe.org>
<627b070a$0$698$14726298@news.sunsite.dk> <t5paer$c29$1@gioia.aioe.org>
<t5pe61$nsg$1@dont-email.me> <6280ff3f$0$707$14726298@news.sunsite.dk>
<t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org>
<62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org>
<t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org>
<t60lru$qt9$1@dont-email.me> <62840f9c$0$695$14726298@news.sunsite.dk>
<t61674$gqn$1@dont-email.me> <t62dok$1ioj$1@gioia.aioe.org>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <3cb3498a-61cc-4e34-8e4b-7956f176a54fn@googlegroups.com>
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
From: xyzzy1...@gmail.com (John Reagan)
Injection-Date: Wed, 18 May 2022 12:12:42 +0000
Content-Type: text/plain; charset="UTF-8"
X-Received-Bytes: 4669
 by: John Reagan - Wed, 18 May 2022 12:12 UTC

On Wednesday, May 18, 2022 at 5:20:22 AM UTC-4, hb wrote:
> On 5/18/22 00:05, Craig A. Berry wrote:
> > ...
> > Or you've got a LIB$INITIALIZE routine to set the DECC$ features at
> > start-up time; I may not be explaining this right but I think that
> > routine has to be referenced by a 32-bit pointer because that's where
> > the image activator will look for it.
> The image activator doesn't care about the pointer size. Only for
> shareable images, the image activator calls the code in the
> LIB$INITIALIZE module, which was (by request) linked into the shareable.
> Its entry point was written by the linker and that's what the image
> activator is looking for. The code in LIB$INITIALIZE expects an array of
> 32-bit pointers in the LIB$INITIALIZE PSECTs. They are function pointers
> which are always 32 bit. This array is set up by the developer and
> filled with the pointers. If the source module for setting this up was
> compiled with 64 bit pointers, an array of pointers has 64 bit entries.
> With the function pointers being 32 bits, the array from
> LIB$INITIALIZE's point of view contains zero pointers. For the
> LIB$INITIALIZE code a zero pointer is the end of the list. With 64-bit
> pointers, that stops you from having more than one init routine called
> "from the image activator". When the image activation is done, the main
> image is started with SYS$IMGSTA, which calls the code in the
> LIB$INITIALIZE module, ...
>
> That also explains, why you can debug init code of a main image, but you
> can't debug the init code of a shareable image (other than you run it as
> a main image).
>
> Some people may think SYS$IMGSTA (or even LIB$INITIALIZE) is part of the
> image activator. From my point of view, it is not.
>
> This all applies to the traditional VMS image initialization with the
> LIB$INITIALIZE PSECTs. On x86 the ELF .init_array sections are
> supported. They contain 64-bit pointers.
>
> FWIW, the linker on/for x86 was enhanced to include the LIB$INITIALIZE
> module from STARLET.OLB, whenever it encounters a LIB$INITIALIZE PSECT
> or .init_array section.

One small comment on hb's perfect response. The addition of .init_array support
on x86 is there only to be used by C++ code. The normal OpenVMS mechanism is the
array of 32-bit pointers in LIB$INITIALIZE.

And while hb doesn't consider IMG$IMGSTA as part of the "image activator", I would
say that most people do. It is part of the OS that "loads and starts" a program.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<68adaeba-65c9-4c5a-b7e0-a60ae798fa0dn@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22704&group=comp.os.vms#22704

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:622a:1195:b0:2f3:b8bf:46ab with SMTP id m21-20020a05622a119500b002f3b8bf46abmr23747114qtk.190.1652876504337;
Wed, 18 May 2022 05:21:44 -0700 (PDT)
X-Received: by 2002:a05:622a:44c:b0:2f3:d2aa:6fc6 with SMTP id
o12-20020a05622a044c00b002f3d2aa6fc6mr24059397qtx.146.1652876504142; Wed, 18
May 2022 05:21:44 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer02.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 18 May 2022 05:21:43 -0700 (PDT)
In-Reply-To: <3680376f-d43c-41af-90c1-8f40b1792929n@googlegroups.com>
Injection-Info: google-groups.googlegroups.com; posting-host=73.60.222.222; posting-account=M3IgSwoAAADJd6EnOmsrCCfB6_OyTOkv
NNTP-Posting-Host: 73.60.222.222
References: <t51g33$q73$1@dont-email.me> <62757a46$0$695$14726298@news.sunsite.dk>
<8c93548f-28f7-48f8-9fb9-d023bce7f13dn@googlegroups.com> <51ace26c-f55e-4afb-9bcc-8c3ab92418a0n@googlegroups.com>
<3e156c0b-63aa-453d-86c9-5615076cdb60n@googlegroups.com> <627816cf$0$705$14726298@news.sunsite.dk>
<t5b2vq$4n3$1@dont-email.me> <dad8aa6fa7ed644e9b648ca53b07bad428d2c5cc.camel@munted.eu>
<63e02e62-8e1e-44ee-8434-e3d0cb252d30n@googlegroups.com> <t5f0m6$1ft7$3@gioia.aioe.org>
<627b070a$0$698$14726298@news.sunsite.dk> <t5paer$c29$1@gioia.aioe.org>
<t5pe61$nsg$1@dont-email.me> <6280ff3f$0$707$14726298@news.sunsite.dk>
<t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org>
<62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org>
<t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org>
<62840574$0$698$14726298@news.sunsite.dk> <t611b5$dn9$1@dont-email.me>
<62840cfd$0$705$14726298@news.sunsite.dk> <t61481$29p$1@dont-email.me>
<t62an4$7e4$1@gioia.aioe.org> <3680376f-d43c-41af-90c1-8f40b1792929n@googlegroups.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <68adaeba-65c9-4c5a-b7e0-a60ae798fa0dn@googlegroups.com>
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
From: xyzzy1...@gmail.com (John Reagan)
Injection-Date: Wed, 18 May 2022 12:21:44 +0000
Content-Type: text/plain; charset="UTF-8"
X-Received-Bytes: 3719
 by: John Reagan - Wed, 18 May 2022 12:21 UTC

On Wednesday, May 18, 2022 at 7:59:58 AM UTC-4, osuv...@gmail.com wrote:
> On Wednesday, May 18, 2022 at 4:28:23 AM UTC-4, hb wrote:
> > On x86, by default the linker puts code into P2; on request the linker
> > can move code into P0. On x86 the function pointer is a code address of
> > a single code instruction, which uses a 64 bit address to jump to the
> > "real" code. The linker creates this code instruction. On IA64, by
> > default the linker puts code into P0; on request, the linker can move
> > code into P2. On IA64 the function pointer is the address of a data
> > structure, a Function Descriptor (FD), which contains a 64 bit address
> > of the "real" code. The linker creates the FD.
> My C code often assumes auto storage class variables (i.e. the stack) are in
> 32-bit space, but I don't recall seeing that explicitly documented anywhere. I
> define a macro, RMS_MALLOC, as an alias for _malloc32 since RMS structs
> are the main thing I deal with plagued with 32-bit pointers.
Yes, the stack is in 32-bit memory. The Calling Standard doesn't directly say
that but says the stack starts where the OS says. Since the addresses of
stack variables are used in descriptors, itemlists, RMS structs have 32-bit
pointers in them, the stack says in 32-bit space.

And yes, even a RAB64 has a mixture of 64-bit pointers and 32-bit pointers.
I've always been frustrated with that feature. A RAB64 should have been
fully extended to 64-bit pointers. Of course RAB64 is just the start of those
ugly data structures.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63ap0$k1l$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22714&group=comp.os.vms#22714

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
Date: Wed, 18 May 2022 17:35:28 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 33
Message-ID: <t63ap0$k1l$1@dont-email.me>
References: <t51g33$q73$1@dont-email.me> <t53327$v1d$1@dont-email.me> <70477de0-a2e1-4f8e-ac6f-950a6aba3f28n@googlegroups.com> <62757a46$0$695$14726298@news.sunsite.dk> <8c93548f-28f7-48f8-9fb9-d023bce7f13dn@googlegroups.com> <51ace26c-f55e-4afb-9bcc-8c3ab92418a0n@googlegroups.com> <3e156c0b-63aa-453d-86c9-5615076cdb60n@googlegroups.com> <627816cf$0$705$14726298@news.sunsite.dk> <t5b2vq$4n3$1@dont-email.me> <dad8aa6fa7ed644e9b648ca53b07bad428d2c5cc.camel@munted.eu> <63e02e62-8e1e-44ee-8434-e3d0cb252d30n@googlegroups.com> <t5f0m6$1ft7$3@gioia.aioe.org> <627b070a$0$698$14726298@news.sunsite.dk> <t5paer$c29$1@gioia.aioe.org> <t5pe61$nsg$1@dont-email.me> <6280ff3f$0$707$14726298@news.sunsite.dk> <t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org> <62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org> <t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org> <t60lru$qt9$1@dont-email.me> <62840f9c$0$695$14726298@news.sunsite.dk>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 18 May 2022 17:35:28 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="f17dbe42ed16730bbf95447d3e1331f9";
logging-data="20533"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX195Nv/uT/nlgy9pJoqeFEuBjItMk89FwO8="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:USdMkGLXMtvxYd1lMRfvEeER5Pw=
 by: Simon Clubley - Wed, 18 May 2022 17:35 UTC

On 2022-05-17, Arne Vajhøj <arne@vajhoej.dk> wrote:
> On 5/17/2022 1:26 PM, Simon Clubley wrote:
>> This is utterly unlike anything you will be used to in Linux (for example),
>> where the size of the pointer is abstracted away from you as a C pointer
>> type. In VMS, due to the original assembly language nature of VMS, pointer
>> sizes are directly visible in the source code.
>
> Some compatibility decisions was made 3 decades ago that has long
> lasting impact.
>
> That the usage of Macro-32 for applications was a major reason
> is something you have claimed many times. But there are no
> proofs that was more important than the other potential reasons,
> so it is speculation.
>

So why do you think that VMS APIs continued to have the size of pointers
directly visible in data structures instead of being hidden behind
a HLL pointer data type whose size could be changed on demand with
compiler options without any major source code changes required ?

Unix works in this way. Why couldn't VMS move to that model when moving
to a 64-bit architecture ?

It would have been a lot easier to do that instead of all the convoluted
stuff VMS ended up doing to support 32-bit pointers and data structures
in existing applications.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63bno$k1l$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22715&group=comp.os.vms#22715

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
Date: Wed, 18 May 2022 17:51:52 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 26
Message-ID: <t63bno$k1l$2@dont-email.me>
References: <6280ff3f$0$707$14726298@news.sunsite.dk> <t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org> <62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org> <t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org> <62840574$0$698$14726298@news.sunsite.dk> <t611b5$dn9$1@dont-email.me> <t618ta$1if$1@dont-email.me>
Injection-Date: Wed, 18 May 2022 17:51:52 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="f17dbe42ed16730bbf95447d3e1331f9";
logging-data="20533"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/ZrZYITO1W/yvmsiZHRUF2YVBA77PPNuI="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:6jKHvTo3hfIfdH7teXud8/pNUkQ=
 by: Simon Clubley - Wed, 18 May 2022 17:51 UTC

On 2022-05-17, Dave Froble <davef@tsoft-inc.com> wrote:
>
> I'm just wondering how many VMS uses actually need the 64 bit addressing? At
> least Basic, and perhaps other languages, were never modified to take advantage
> of 64 bit addressing.
>
> Sure, there can be some uses that have such a requirement. If it doesn't exist
> (VAX) then VMS cannot be used in such cases.
>
> But, for the most part, is this a serious issue, or, something to dispare over?
>

Yes, it's a serious issue.

There's a reason why everyone is moving from 32-bit to 64-bit processors
for anything outside of embedded type systems.

In fact, it's been an issue for decades with servers. The original PRISM
design flipped between being a 32-bit or 64-bit architecture so even back
in the late 1980s, this was already becoming an issue.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63cf5$703$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22716&group=comp.os.vms#22716

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on
x86
Date: Wed, 18 May 2022 14:04:22 -0400
Organization: A noiseless patient Spider
Lines: 46
Message-ID: <t63cf5$703$1@dont-email.me>
References: <t51g33$q73$1@dont-email.me> <t53327$v1d$1@dont-email.me>
<70477de0-a2e1-4f8e-ac6f-950a6aba3f28n@googlegroups.com>
<62757a46$0$695$14726298@news.sunsite.dk>
<8c93548f-28f7-48f8-9fb9-d023bce7f13dn@googlegroups.com>
<51ace26c-f55e-4afb-9bcc-8c3ab92418a0n@googlegroups.com>
<3e156c0b-63aa-453d-86c9-5615076cdb60n@googlegroups.com>
<627816cf$0$705$14726298@news.sunsite.dk> <t5b2vq$4n3$1@dont-email.me>
<dad8aa6fa7ed644e9b648ca53b07bad428d2c5cc.camel@munted.eu>
<63e02e62-8e1e-44ee-8434-e3d0cb252d30n@googlegroups.com>
<t5f0m6$1ft7$3@gioia.aioe.org> <627b070a$0$698$14726298@news.sunsite.dk>
<t5paer$c29$1@gioia.aioe.org> <t5pe61$nsg$1@dont-email.me>
<6280ff3f$0$707$14726298@news.sunsite.dk> <t5ro1r$t4l$1@dont-email.me>
<t5s1hk$1cht$1@gioia.aioe.org> <62818b7e$0$704$14726298@news.sunsite.dk>
<t5tq5l$5fi$1@gioia.aioe.org> <t5u18r$1af$1@dont-email.me>
<t60d9v$1bte$1@gioia.aioe.org> <t60lru$qt9$1@dont-email.me>
<62840f9c$0$695$14726298@news.sunsite.dk> <t63ap0$k1l$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Wed, 18 May 2022 18:04:21 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="60ec5eaaf1af380be3978102f6570660";
logging-data="7171"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+uI/bmSpFaIze9m0/E62C+Sv6vyZFj5k0="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:8u7H/3F3wvNsKjuOSWNNQFbIpgY=
In-Reply-To: <t63ap0$k1l$1@dont-email.me>
 by: Dave Froble - Wed, 18 May 2022 18:04 UTC

On 5/18/2022 1:35 PM, Simon Clubley wrote:
> On 2022-05-17, Arne Vajhøj <arne@vajhoej.dk> wrote:
>> On 5/17/2022 1:26 PM, Simon Clubley wrote:
>>> This is utterly unlike anything you will be used to in Linux (for example),
>>> where the size of the pointer is abstracted away from you as a C pointer
>>> type. In VMS, due to the original assembly language nature of VMS, pointer
>>> sizes are directly visible in the source code.
>>
>> Some compatibility decisions was made 3 decades ago that has long
>> lasting impact.
>>
>> That the usage of Macro-32 for applications was a major reason
>> is something you have claimed many times. But there are no
>> proofs that was more important than the other potential reasons,
>> so it is speculation.

Correct. And remember, some strictly 32 bit apps are supported, as per initial
planning. Perhaps addresses are extended. That's not part of an app, as far as
I can see.

> So why do you think that VMS APIs continued to have the size of pointers
> directly visible in data structures instead of being hidden behind
> a HLL pointer data type whose size could be changed on demand with
> compiler options without any major source code changes required ?

Because this is VMS, not Unix, and some jobs just might need the flexibility?

> Unix works in this way. Why couldn't VMS move to that model when moving
> to a 64-bit architecture ?

Because this is VMS, not snake oil Unix?

> It would have been a lot easier to do that instead of all the convoluted
> stuff VMS ended up doing to support 32-bit pointers and data structures
> in existing applications.

Tell me what you think would have happened if Alpha would not have run VAX
applications? Yeah, DEC died anyway, but it would have been a lot quicker.

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63clt$703$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22717&group=comp.os.vms#22717

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on
x86
Date: Wed, 18 May 2022 14:07:59 -0400
Organization: A noiseless patient Spider
Lines: 23
Message-ID: <t63clt$703$2@dont-email.me>
References: <6280ff3f$0$707$14726298@news.sunsite.dk>
<t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org>
<62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org>
<t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org>
<62840574$0$698$14726298@news.sunsite.dk> <t611b5$dn9$1@dont-email.me>
<t618ta$1if$1@dont-email.me> <t63bno$k1l$2@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 18 May 2022 18:07:57 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="60ec5eaaf1af380be3978102f6570660";
logging-data="7171"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19hm0W5V+Kv7Lpxz9kjv6nOh10FIZf6ZCE="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:dhy+dEmyDlEmyw/lV0pbXRJ4vDo=
In-Reply-To: <t63bno$k1l$2@dont-email.me>
 by: Dave Froble - Wed, 18 May 2022 18:07 UTC

On 5/18/2022 1:51 PM, Simon Clubley wrote:
> On 2022-05-17, Dave Froble <davef@tsoft-inc.com> wrote:
>>
>> I'm just wondering how many VMS uses actually need the 64 bit addressing? At
>> least Basic, and perhaps other languages, were never modified to take advantage
>> of 64 bit addressing.
>>
>> Sure, there can be some uses that have such a requirement. If it doesn't exist
>> (VAX) then VMS cannot be used in such cases.
>>
>> But, for the most part, is this a serious issue, or, something to dispare over?
>>
>
> Yes, it's a serious issue.

Ok, then just what is the issue? Calling it "serious" doesn't define it.

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63cqc$k1l$3@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22718&group=comp.os.vms#22718

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
Date: Wed, 18 May 2022 18:10:20 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 35
Message-ID: <t63cqc$k1l$3@dont-email.me>
References: <t51g33$q73$1@dont-email.me> <t53327$v1d$1@dont-email.me> <70477de0-a2e1-4f8e-ac6f-950a6aba3f28n@googlegroups.com> <62757a46$0$695$14726298@news.sunsite.dk> <8c93548f-28f7-48f8-9fb9-d023bce7f13dn@googlegroups.com> <51ace26c-f55e-4afb-9bcc-8c3ab92418a0n@googlegroups.com> <3e156c0b-63aa-453d-86c9-5615076cdb60n@googlegroups.com> <627816cf$0$705$14726298@news.sunsite.dk> <t5b2vq$4n3$1@dont-email.me> <dad8aa6fa7ed644e9b648ca53b07bad428d2c5cc.camel@munted.eu> <63e02e62-8e1e-44ee-8434-e3d0cb252d30n@googlegroups.com> <t5f0m6$1ft7$3@gioia.aioe.org> <627b070a$0$698$14726298@news.sunsite.dk> <t5paer$c29$1@gioia.aioe.org> <t5pe61$nsg$1@dont-email.me> <6280ff3f$0$707$14726298@news.sunsite.dk> <t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org> <62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org> <t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org> <t60lru$qt9$1@dont-email.me> <t619n0$1qjq$1@gioia.aioe.org>
Injection-Date: Wed, 18 May 2022 18:10:20 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="f17dbe42ed16730bbf95447d3e1331f9";
logging-data="20533"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/BJf6NI1eOZvABMKdc72dtRaooIJxZGZQ="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:fH0rcaTojuWBAje6y9k8Ix/3TTo=
 by: Simon Clubley - Wed, 18 May 2022 18:10 UTC

On 2022-05-17, chris <chris-nospam@tridac.net> wrote:
>
> Disappointing, but still doesn't amswer the question. Namely, if the
> code is 32 bit, how does vms know where to put that in 64 bit space ?.
>
> The question is relevant, since code has to be loaded at an address,
> usually defined at link time, unless fully position independent code
> is used, which can be quite inefficient. Perhaps the run time libraries
> deal with the that, but not clear. Also, how do the P0, P1, S0, S1
> segments relate to that ?...
>

The loader has no knowledge of whether the image uses 32-bit pointers
or a mixture of 32-bit and 64-bit pointers. On VMS, that, and whether
the program calls 32-bit VMS APIs only or a mixture of 32-bit and 64-bit
APIs is purely an internal matter within the VMS executable image.

Every image, regardless of how it uses pointers internally, gets loaded
at the same point within the process address space by the loader.

On Alpha VMS, all VMS APIs are 32-bit only unless they were extended to
have a 64-bit version, which many of them (but not all of them) were.

You need to stop thinking of VMS 64-bit capable programs as being
something nice and clean like the way it works on other operating systems.

64-bit capable programs on VMS are an ugly compromise because VMS had
to deal with 32-bit backwards compatibility issues that other operating
systems simply don't have to worry about.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63d8b$k1l$4@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22719&group=comp.os.vms#22719

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
Date: Wed, 18 May 2022 18:17:47 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 34
Message-ID: <t63d8b$k1l$4@dont-email.me>
References: <t51g33$q73$1@dont-email.me> <70477de0-a2e1-4f8e-ac6f-950a6aba3f28n@googlegroups.com> <62757a46$0$695$14726298@news.sunsite.dk> <8c93548f-28f7-48f8-9fb9-d023bce7f13dn@googlegroups.com> <51ace26c-f55e-4afb-9bcc-8c3ab92418a0n@googlegroups.com> <3e156c0b-63aa-453d-86c9-5615076cdb60n@googlegroups.com> <627816cf$0$705$14726298@news.sunsite.dk> <t5b2vq$4n3$1@dont-email.me> <dad8aa6fa7ed644e9b648ca53b07bad428d2c5cc.camel@munted.eu> <63e02e62-8e1e-44ee-8434-e3d0cb252d30n@googlegroups.com> <t5f0m6$1ft7$3@gioia.aioe.org> <627b070a$0$698$14726298@news.sunsite.dk> <t5paer$c29$1@gioia.aioe.org> <t5pe61$nsg$1@dont-email.me> <6280ff3f$0$707$14726298@news.sunsite.dk> <t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org> <62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org> <t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org> <t60lru$qt9$1@dont-email.me> <62840f9c$0$695$14726298@news.sunsite.dk> <t63ap0$k1l$1@dont-email.me> <t63cf5$703$1@dont-email.me>
Injection-Date: Wed, 18 May 2022 18:17:47 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="f17dbe42ed16730bbf95447d3e1331f9";
logging-data="20533"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/ty9n4DMoEImiE+33qYGH7FP4aa1b/iWM="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:jC4//6wuoAxuEU2BVpSlMi8UGnE=
 by: Simon Clubley - Wed, 18 May 2022 18:17 UTC

On 2022-05-18, Dave Froble <davef@tsoft-inc.com> wrote:
> On 5/18/2022 1:35 PM, Simon Clubley wrote:
>> So why do you think that VMS APIs continued to have the size of pointers
>> directly visible in data structures instead of being hidden behind
>> a HLL pointer data type whose size could be changed on demand with
>> compiler options without any major source code changes required ?
>
> Because this is VMS, not Unix, and some jobs just might need the flexibility?
>

So you admit the need to support Macro-32 applications was a requirement ? :-)

>> It would have been a lot easier to do that instead of all the convoluted
>> stuff VMS ended up doing to support 32-bit pointers and data structures
>> in existing applications.
>
> Tell me what you think would have happened if Alpha would not have run VAX
> applications? Yeah, DEC died anyway, but it would have been a lot quicker.
>

Alpha needed to run VAX applications, but because of how VMS was designed,
DEC had to make some very ugly design decisions for VMS on Alpha.

These are things that Unix systems mostly don't need to worry about.

About the only time you need to worry about such things on Unix is when
(for example) you are writing device drivers and the driver needs to use
bounce buffers because of hardware limitations.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63dlg$k1l$5@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22720&group=comp.os.vms#22720

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
Date: Wed, 18 May 2022 18:24:48 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 27
Message-ID: <t63dlg$k1l$5@dont-email.me>
References: <6280ff3f$0$707$14726298@news.sunsite.dk> <t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org> <62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org> <t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org> <62840574$0$698$14726298@news.sunsite.dk> <t611b5$dn9$1@dont-email.me> <t618ta$1if$1@dont-email.me> <t63bno$k1l$2@dont-email.me> <t63clt$703$2@dont-email.me>
Injection-Date: Wed, 18 May 2022 18:24:48 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="f17dbe42ed16730bbf95447d3e1331f9";
logging-data="20533"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+alt8tlL1nHG9aoT9h4N7v0FRpaMknA24="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:tZrPNq7GES9KANNqMj44on9hJ/w=
 by: Simon Clubley - Wed, 18 May 2022 18:24 UTC

On 2022-05-18, Dave Froble <davef@tsoft-inc.com> wrote:
> On 5/18/2022 1:51 PM, Simon Clubley wrote:
>> On 2022-05-17, Dave Froble <davef@tsoft-inc.com> wrote:
>>>
>>> I'm just wondering how many VMS uses actually need the 64 bit addressing? At
>>> least Basic, and perhaps other languages, were never modified to take advantage
>>> of 64 bit addressing.
>>>
>>> Sure, there can be some uses that have such a requirement. If it doesn't exist
>>> (VAX) then VMS cannot be used in such cases.
>>>
>>> But, for the most part, is this a serious issue, or, something to dispare over?
>>>
>>
>> Yes, it's a serious issue.
>
> Ok, then just what is the issue? Calling it "serious" doesn't define it.
>

Applications increasingly need access to the additional address space
that 64-bit processors gives them.

Simon.

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on

<memo.20220518200645.11824U@jgd.cix.co.uk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22721&group=comp.os.vms#22721

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: jgd...@cix.co.uk (John Dallman)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on
Date: Wed, 18 May 2022 20:06 +0100 (BST)
Organization: A noiseless patient Spider
Lines: 23
Message-ID: <memo.20220518200645.11824U@jgd.cix.co.uk>
References: <62842f29$0$698$14726298@news.sunsite.dk>
Reply-To: jgd@cix.co.uk
Injection-Info: reader02.eternal-september.org; posting-host="de1c4861a0bcedb74b10d62c452f56c0";
logging-data="3998"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX193x/m4f3bVr3UsFcPmMdbQnZwscwGz7iE="
Cancel-Lock: sha1:0w/3957OhegaA7IhRymwNkk9aqY=
 by: John Dallman - Wed, 18 May 2022 19:06 UTC

In article <62842f29$0$698$14726298@news.sunsite.dk>, arne@vajhoej.dk
(Arne Vajh�j) wrote:

> Many custom scientific applications (Fortran, Python).

Also many kinds of mathematical modellers, simulation systems and
graphics programs. They can be done as 32-bit programs, but they just
can't hold enough data in a 32-bit address space for big jobs.

> For custom business application (Cobol, Basic, Pascal,
> Java or in some cases C) there must still be a lot of applications
> that don't need it (as in "really don't need it" not just
> "can live without it").

Certainly are.

> And if/when VSI start courting ISV's not currently on VMS to
> support VMS, then the vast majority will expect good 64 bit
> support.

They will.

John

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<628552d5$0$707$14726298@news.sunsite.dk>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22724&group=comp.os.vms#22724

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!news.uzoreto.com!dotsrc.org!filter.dotsrc.org!news.dotsrc.org!not-for-mail
Date: Wed, 18 May 2022 16:10:54 -0400
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:91.0) Gecko/20100101
Thunderbird/91.9.0
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on
x86
Content-Language: en-US
Newsgroups: comp.os.vms
References: <6280ff3f$0$707$14726298@news.sunsite.dk>
<t5ro1r$t4l$1@dont-email.me> <t5s1hk$1cht$1@gioia.aioe.org>
<62818b7e$0$704$14726298@news.sunsite.dk> <t5tq5l$5fi$1@gioia.aioe.org>
<t5u18r$1af$1@dont-email.me> <t60d9v$1bte$1@gioia.aioe.org>
<62840574$0$698$14726298@news.sunsite.dk> <t611b5$dn9$1@dont-email.me>
<t618ta$1if$1@dont-email.me> <62842f29$0$698$14726298@news.sunsite.dk>
<t61set$di0$1@dont-email.me>
From: arn...@vajhoej.dk (Arne Vajhøj)
In-Reply-To: <t61set$di0$1@dont-email.me>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Lines: 68
Message-ID: <628552d5$0$707$14726298@news.sunsite.dk>
Organization: SunSITE.dk - Supporting Open source
NNTP-Posting-Host: 625916a5.news.sunsite.dk
X-Trace: 1652904662 news.sunsite.dk 707 arne@vajhoej.dk/68.9.63.232:50955
X-Complaints-To: staff@sunsite.dk
 by: Arne Vajhøj - Wed, 18 May 2022 20:10 UTC

On 5/18/2022 12:25 AM, Dave Froble wrote:
> On 5/17/2022 7:26 PM, Arne Vajhøj wrote:
>> On 5/17/2022 6:51 PM, Dave Froble wrote:
>>> I'm just wondering how many VMS uses actually need the 64 bit
>>> addressing?  At
>>> least Basic, and perhaps other languages, were never modified to take
>>> advantage of 64 bit addressing.
>>>
>>> Sure, there can be some uses that have such a requirement.  If it
>>> doesn't
>>> exist (VAX) then VMS cannot be used in such cases.
>>>
>>> But, for the most part, is this a serious issue, or, something to
>>> dispare over?
>>
>> There is a reason why Alpha was made 64 bit and not 32 bit
>> those 3 decades ago.
>>
>> There are definitely application types that need 64 bit
>> capability.
>
> I just wonder what percentage of current VMS users need 64 bit addresses.
>
>> Databases are one case. And I believe that was the case
>> driving the Alpha decision all these years ago.
>>
>> There are other memory hungry application types.
>>
>> Some platform software: cache servers, Java EE application
>> servers, message queue servers etc..
>>
>> Many custom scientific applications (Fortran, Python).
>>
>> For custom business application (Cobol, Basic, Pascal,
>> Java or in some cases C) there must still be a lot of applications
>> that don't need it (as in "really don't need it" not just
>> "can live without it").
>>
>> But application tend to grow over time so more applications
>> will want to use the full 64 bit space as times goes by.
>>
>> And if/when VSI start courting ISV's not currently on VMS to
>> support VMS, then the vast majority will expect good 64 bit
>> support.
>
> Agreed, it's a "check box" item, better have it.

I obviously don't know what all VMS systems are used for.

:-)

But if I use my crystal ball and my best RNG and divide with
the current local temperature and multiply with the
date I see the following.

current VMS users:

20% use 64 bit capabilities in their code
60% use 64 bit capabilities either in their code or in dependencies

future new VMS users:

66% use 64 bit capabilities in their code
95% use 64 bit capabilities either in their code or in dependencies

Arne

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63kia$ak6$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22725&group=comp.os.vms#22725

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
Date: Wed, 18 May 2022 16:22:34 -0400
Organization: HoffmanLabs LLC
Lines: 65
Message-ID: <t63kia$ak6$1@dont-email.me>
References: <t60d9v$1bte$1@gioia.aioe.org> <62840574$0$698$14726298@news.sunsite.dk> <t611b5$dn9$1@dont-email.me> <62840cfd$0$705$14726298@news.sunsite.dk> <t61481$29p$1@dont-email.me> <t62an4$7e4$1@gioia.aioe.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="03e7c026039077bd930b3ceb94f4de8a";
logging-data="10886"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/We6znQIsC6klglZakFv/Talrq2zWp4CQ="
User-Agent: Unison/2.2
Cancel-Lock: sha1:xSSwgsGFBtyy5PxHsUQsany/ask=
 by: Stephen Hoffman - Wed, 18 May 2022 20:22 UTC

On 2022-05-18 08:28:20 +0000, hb said:

> On 5/17/22 23:31, Stephen Hoffman wrote:
>> On 2022-05-17 21:00:39 +0000, Arne Vajhj said:
>> ...
>>> I thought they had started moving code up to P2.
>>
>> Code which is inaccessible to 32-bit addresses, so don't try to pass a
>> function pointer to that code.
>
> On x86 and IA64 function pointers are always 32 bit.
>
> On x86, by default the linker puts code into P2; on request the linker
> can move code into P0. On x86 the function pointer is a code address of
> a single code instruction, which uses a 64 bit address to jump to the
> "real" code. The linker creates this code instruction. On IA64, by
> default the linker puts code into P0; on request, the linker can move
> code into P2. On IA64 the function pointer is the address of a data
> structure, a Function Descriptor (FD), which contains a 64 bit address
> of the "real" code. The linker creates the FD.

Though AFAIK the user works with a 64-bit value for the function
pointer, and doesn't ever see the internal limitations nor the use of a
trampoline where that's needed.

I don't have an Itanium handy to test and E9.2 isn't playing nicely at
the moment, so here is OpenVMS Alpha code showing a 64-bit function
pointer being used.

Since I haven't used the non-default ALLOC_64BIT or /SEGMENT=CODE=64
(I64 and x86-64 only), which means the generated code resides in P0
32-bit and not in P2 64-bit.

Which ties back to the surprising complexity awaiting new developers here.

$ cc/point=64 ptr64
$ lin ptr64
$ r ptr64
Hi!
sizeof(foo) = 8
$ ty ptr64.c
#include <stddef.h>
#include <stdio.h>
#include <stdlib.h>
void bar() {
printf("Hi!\n");
return;
} int main( int argc, int *argv[] ) {
void (*foo)();
foo = bar;
foo();
printf("sizeof(foo) = %d\n", sizeof(foo));
exit( EXIT_SUCCESS );
}

--
Pure Personal Opinion | HoffmanLabs LLC

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63mem$h8q$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22726&group=comp.os.vms#22726

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
Date: Wed, 18 May 2022 16:54:47 -0400
Organization: HoffmanLabs LLC
Lines: 74
Message-ID: <t63mem$h8q$1@dont-email.me>
References: <t60d9v$1bte$1@gioia.aioe.org> <t60lru$qt9$1@dont-email.me> <62840f9c$0$695$14726298@news.sunsite.dk> <t61674$gqn$1@dont-email.me> <t62dok$1ioj$1@gioia.aioe.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="03e7c026039077bd930b3ceb94f4de8a";
logging-data="17690"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/7dEuDU51ds1U4VxMSZX1XIIIot7USZW4="
User-Agent: Unison/2.2
Cancel-Lock: sha1:kldk9+gQMNiJxnVdHS6MMC6ZE6M=
 by: Stephen Hoffman - Wed, 18 May 2022 20:54 UTC

On 2022-05-18 09:20:19 +0000, hb said:

> On 5/18/22 00:05, Craig A. Berry wrote:
>> ...
>> Or you've got a LIB$INITIALIZE routine to set the DECC$ features at
>> start-up time; I may not be explaining this right but I think that
>> routine has to be referenced by a 32-bit pointer because that's where
>> the image activator will look for it.
>
> The image activator doesn't care about the pointer size. Only for
> shareable images, the image activator calls the code in the
> LIB$INITIALIZE module, which was (by request) linked into the
> shareable. Its entry point was written by the linker and that's what
> the image activator is looking for. The code in LIB$INITIALIZE expects
> an array of 32-bit pointers in the LIB$INITIALIZE PSECTs. They are
> function pointers which are always 32 bit. This array is set up by the
> developer and filled with the pointers. If the source module for
> setting this up was compiled with 64 bit pointers, an array of pointers
> has 64 bit entries. With the function pointers being 32 bits, the array
> from LIB$INITIALIZE's point of view contains zero pointers. For the
> LIB$INITIALIZE code a zero pointer is the end of the list. With 64-bit
> pointers, that stops you from having more than one init routine called
> "from the image activator". When the image activation is done, the main
> image is started with SYS$IMGSTA, which calls the code in the
> LIB$INITIALIZE module, ...

More than a little of which is code necessary to work around other
backward-compatibility efforts, not the least of which is defensive app
coding around against the DECC$ feature logical names.

> That also explains, why you can debug init code of a main image, but
> you can't debug the init code of a shareable image (other than you run
> it as a main image).
>
> Some people may think SYS$IMGSTA (or even LIB$INITIALIZE) is part of
> the image activator. From my point of view, it is not.

That case could be made.

From out here in the peanut gallery, $IMGACT, $IMGSTA, $IMGFIX,
LIB$INITIALIZE, and the C run-time activation are all are part of image
activation. Without regard to how the code within the image activator
and related pieces is partitioned. All the stuff that happens before
the user code gets control. The LIB$INITIALIZE and LIB$INITIALIZE PSECT
stuff and the C main stuff and the DECC$ feature logical names are all
hacks seeking to establish and modify the run-time environment for the
code being activated, and all that before the user code gets control.
(And yes, I'm very deliberately pushing LIB$INITIALIZE code written by
ISVs and developers into this same bog with the image activator, as
that code only exists because of the limitations of image activation
implementation. If I didn't have to defend against DECC$* stuff, I
wouldn't have the code or the PSECT.)

The design of image activation code has been ignored, but then changes
here can and will break stuff, and either fixing this stuff or
overhauling the whole area—checking app signatures, telemetry,
provisioning, pledge-/promise-/unveil-like mechanisms, better app
packaging, are each substantial investments, and what's here usually
works.

Here's how another platform architected and stores this sort of
information:
https://developer.apple.com/library/archive/documentation/General/Reference/InfoPlistKeyReference/Articles/AboutInformationPropertyListFiles.html#//apple_ref/doc/uid/TP40009254-SW1
Is that perfect? Far from it. It is, however, a little more easy to
figure out what's going on, and to add and extend what the image (app)
activation provides. In OpenVMS terms, that property list file is a
combination of what is stored the image header, as well as the
initialization-related stuff, the DECC$* feature logical names, and
details and features not implemented on OpenVMS.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63mli$va6$1@gioia.aioe.org>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22727&group=comp.os.vms#22727

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!aioe.org!7hIokGb+duKXg7lAlAQ48g.user.46.165.242.91.POSTED!not-for-mail
From: end...@inter.net (hb)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on
x86
Date: Wed, 18 May 2022 22:58:25 +0200
Organization: Aioe.org NNTP Server
Message-ID: <t63mli$va6$1@gioia.aioe.org>
References: <t60d9v$1bte$1@gioia.aioe.org>
<62840574$0$698$14726298@news.sunsite.dk> <t611b5$dn9$1@dont-email.me>
<62840cfd$0$705$14726298@news.sunsite.dk> <t61481$29p$1@dont-email.me>
<t62an4$7e4$1@gioia.aioe.org> <t63kia$ak6$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Info: gioia.aioe.org; logging-data="32070"; posting-host="7hIokGb+duKXg7lAlAQ48g.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101
Thunderbird/91.8.0
X-Notice: Filtered by postfilter v. 0.9.2
Content-Language: en-US
 by: hb - Wed, 18 May 2022 20:58 UTC

On 5/18/22 22:22, Stephen Hoffman wrote:
> On 2022-05-18 08:28:20 +0000, hb said:
>
>> On 5/17/22 23:31, Stephen Hoffman wrote:
>>> On 2022-05-17 21:00:39 +0000, Arne Vajhj said:
>>> ...
>>>> I thought they had started moving code up to P2.
>>>
>>> Code which is inaccessible to 32-bit addresses, so don't try to pass
>>> a function pointer to that code.
>>
>> On x86 and IA64 function pointers are always 32 bit.
>>
>> On x86, by default the linker puts code into P2; on request the linker
>> can move code into P0. On x86 the function pointer is a code address
>> of a single code instruction, which uses a 64 bit address to jump to
>> the "real" code. The linker creates this code instruction. On IA64, by
>> default the linker puts code into P0; on request, the linker can move
>> code into P2. On IA64 the function pointer is the address of a data
>> structure, a Function Descriptor (FD), which contains a 64 bit address
>> of the "real" code. The linker creates the FD.
>
> Though AFAIK the user works with a 64-bit value for the function
> pointer, and doesn't ever see the internal limitations nor the use of a
> trampoline where that's needed.
>
> I don't have an Itanium handy to test and E9.2 isn't playing nicely at
> the moment, so here is OpenVMS Alpha code showing a 64-bit function
> pointer being used.
>
> Since I haven't used the non-default ALLOC_64BIT or /SEGMENT=CODE=64
> (I64 and x86-64 only), which means the generated code resides in P0
> 32-bit and not in P2 64-bit.
>
> Which ties back to the surprising complexity awaiting new developers here.
>
>
> $ cc/point=64 ptr64
> $ lin ptr64
> $ r ptr64
> Hi!
> sizeof(foo) = 8
> $ ty ptr64.c
> #include <stddef.h>
> #include <stdio.h>
> #include <stdlib.h>
> void bar() {
> printf("Hi!\n");
> return;
> }
> int main( int argc, int *argv[] ) {
> void (*foo)();
> foo = bar;
> foo();
> printf("sizeof(foo) = %d\n", sizeof(foo));
> exit( EXIT_SUCCESS );
> }

OK, I should have said, on x86 and IA64 function pointers always contain
32-bit values.

Or, whenever you take the address of a function, you will get a 32-bit
address.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63oae$iia$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22728&group=comp.os.vms#22728

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: dav...@tsoft-inc.com (Dave Froble)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on
x86
Date: Wed, 18 May 2022 17:26:40 -0400
Organization: A noiseless patient Spider
Lines: 43
Message-ID: <t63oae$iia$1@dont-email.me>
References: <t51g33$q73$1@dont-email.me>
<62757a46$0$695$14726298@news.sunsite.dk>
<8c93548f-28f7-48f8-9fb9-d023bce7f13dn@googlegroups.com>
<51ace26c-f55e-4afb-9bcc-8c3ab92418a0n@googlegroups.com>
<3e156c0b-63aa-453d-86c9-5615076cdb60n@googlegroups.com>
<627816cf$0$705$14726298@news.sunsite.dk> <t5b2vq$4n3$1@dont-email.me>
<dad8aa6fa7ed644e9b648ca53b07bad428d2c5cc.camel@munted.eu>
<63e02e62-8e1e-44ee-8434-e3d0cb252d30n@googlegroups.com>
<t5f0m6$1ft7$3@gioia.aioe.org> <627b070a$0$698$14726298@news.sunsite.dk>
<t5paer$c29$1@gioia.aioe.org> <t5pe61$nsg$1@dont-email.me>
<6280ff3f$0$707$14726298@news.sunsite.dk> <t5ro1r$t4l$1@dont-email.me>
<t5s1hk$1cht$1@gioia.aioe.org> <62818b7e$0$704$14726298@news.sunsite.dk>
<t5tq5l$5fi$1@gioia.aioe.org> <t5u18r$1af$1@dont-email.me>
<t60d9v$1bte$1@gioia.aioe.org> <t60lru$qt9$1@dont-email.me>
<62840f9c$0$695$14726298@news.sunsite.dk> <t63ap0$k1l$1@dont-email.me>
<t63cf5$703$1@dont-email.me> <t63d8b$k1l$4@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 18 May 2022 21:26:38 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="60ec5eaaf1af380be3978102f6570660";
logging-data="19018"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1+nXLJGDnQRQOM1c04RVXI873rh2GapQ9c="
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:45.0) Gecko/20100101
Thunderbird/45.8.0
Cancel-Lock: sha1:aEX8TJ1Ta/+IgLJtXY5DUolMrHI=
In-Reply-To: <t63d8b$k1l$4@dont-email.me>
 by: Dave Froble - Wed, 18 May 2022 21:26 UTC

On 5/18/2022 2:17 PM, Simon Clubley wrote:
> On 2022-05-18, Dave Froble <davef@tsoft-inc.com> wrote:
>> On 5/18/2022 1:35 PM, Simon Clubley wrote:
>>> So why do you think that VMS APIs continued to have the size of pointers
>>> directly visible in data structures instead of being hidden behind
>>> a HLL pointer data type whose size could be changed on demand with
>>> compiler options without any major source code changes required ?
>>
>> Because this is VMS, not Unix, and some jobs just might need the flexibility?
>>
>
> So you admit the need to support Macro-32 applications was a requirement ? :-)

Sure was for me, cause I still have a Macro-32 application (database) in use.
Without that I would never used Alpha or itanic.

>>> It would have been a lot easier to do that instead of all the convoluted
>>> stuff VMS ended up doing to support 32-bit pointers and data structures
>>> in existing applications.
>>
>> Tell me what you think would have happened if Alpha would not have run VAX
>> applications? Yeah, DEC died anyway, but it would have been a lot quicker.
>>
>
> Alpha needed to run VAX applications, but because of how VMS was designed,
> DEC had to make some very ugly design decisions for VMS on Alpha.
>
> These are things that Unix systems mostly don't need to worry about.
>
> About the only time you need to worry about such things on Unix is when
> (for example) you are writing device drivers and the driver needs to use
> bounce buffers because of hardware limitations.
>
> Simon.
>

--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef@tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t63pk1$d6t$1@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=22729&group=comp.os.vms#22729

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: seaoh...@hoffmanlabs.invalid (Stephen Hoffman)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
Date: Wed, 18 May 2022 17:48:49 -0400
Organization: HoffmanLabs LLC
Lines: 37
Message-ID: <t63pk1$d6t$1@dont-email.me>
References: <t61481$29p$1@dont-email.me> <t62an4$7e4$1@gioia.aioe.org> <t63kia$ak6$1@dont-email.me> <t63mli$va6$1@gioia.aioe.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: reader02.eternal-september.org; posting-host="03e7c026039077bd930b3ceb94f4de8a";
logging-data="13533"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19TCF1NXmMct3vcSkb2ewft/cvEZIIYKDY="
User-Agent: Unison/2.2
Cancel-Lock: sha1:XD+rpA6HrP0vPTOSuSyGeVtf6KI=
 by: Stephen Hoffman - Wed, 18 May 2022 21:48 UTC

On 2022-05-18 20:58:25 +0000, hb said:

> OK, I should have said, on x86 and IA64 function pointers always
> contain 32-bit values.
>
> Or, whenever you take the address of a function, you will get a 32-bit address.

Or more specifically, I'll get an opaque 64-bit value that looks and
works like a virtual address, but may or may not represent the actual
virtual address of the target instruction.

An opaque 64-bit virtual-address-like value which may then be folded,
spindled, and trampoline'd (or otherwise procedure-descriptor'd) as
needed, due to software and/or hardware addressing limitations.

Or an address-like value variously tagged, as some platforms are now
doing for improved data integrity and security.

https://www.anandtech.com/show/16759/sponsored-post-keep-your-apps-memory-safe-with-arm-memory-tagging-extension-mte

Which also means that every function pointer trampolines in a P2-based
64-bit app.

The trampolines are obvious targets for run-time "fun", too.

Presumably, those structures are at least moderately protected against
"rogue" or "creative" writes.

But it's an opaque 64-bit value, with an internal design that permits
somewhat less than the full 64-bit virtual address range available for
functions.

--
Pure Personal Opinion | HoffmanLabs LLC

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<11988c0f-11c0-4cd8-9dbc-3250b32667bbn@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=23054&group=comp.os.vms#23054

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:ac8:7e90:0:b0:2fa:f5f6:d0c4 with SMTP id w16-20020ac87e90000000b002faf5f6d0c4mr1371991qtj.635.1654118504924;
Wed, 01 Jun 2022 14:21:44 -0700 (PDT)
X-Received: by 2002:ac8:75c5:0:b0:304:b7a2:b304 with SMTP id
z5-20020ac875c5000000b00304b7a2b304mr1426215qtq.191.1654118504752; Wed, 01
Jun 2022 14:21:44 -0700 (PDT)
Path: i2pn2.org!i2pn.org!usenet.blueworldhosting.com!feed1.usenet.blueworldhosting.com!peer01.iad!feed-me.highwinds-media.com!news.highwinds-media.com!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 1 Jun 2022 14:21:44 -0700 (PDT)
In-Reply-To: <t51g33$q73$1@dont-email.me>
Injection-Info: google-groups.googlegroups.com; posting-host=162.251.133.98; posting-account=-m1l1AkAAAAOcQipwxcZ5ncqqoxN3l1E
NNTP-Posting-Host: 162.251.133.98
References: <t51g33$q73$1@dont-email.me>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <11988c0f-11c0-4cd8-9dbc-3250b32667bbn@googlegroups.com>
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
From: jor...@ccs4vms.com (Rich Jordan)
Injection-Date: Wed, 01 Jun 2022 21:21:44 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Received-Bytes: 2582
 by: Rich Jordan - Wed, 1 Jun 2022 21:21 UTC

On Thursday, May 5, 2022 at 4:37:42 PM UTC-5, Jan-Erik Söderholm wrote:
> Maybe others have seen this, but I just got this announcement from VSI.
> Regards, Jan-Erik.
>
>
>
> After analyzing customer feedback, VMS Software Inc. has made the decision
> to move hypervisor support on OpenVMS V9.2 to the top of our priority list.
> We plan to extend support for the following: VMWare, KVM and Hyper-V. Kevin
> Shaw, the CEO of VMS Software, Inc. and Stephen Nelson, VP Engineering will
> present this update of the VSI x86 rollout strategy at the webinar on May
> 11th. [Registration at https://vmssoftware.com/about/webinars/]
>
> Better hypervisor support will mean being able to run OpenVMS on any x86
> hardware, which is a priority for many customers. However, this also means
> that bare metal support will be delayed – although eventually the DL380 and
> several other server models are planned to be supported. The first limited
> production release of OpenVMS on x86, V9.2, is scheduled for July 2022.

I was on vacation but today at work I was told that Broadcom had bought VMWare and they plan to make it a subscription to run product as quickly as they can.

Wonder how that will impact. Suddenly running a subscription VMS on VMWare might (might! I don't know the prices) be getting more costly.

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<fc6dc821-c247-45fb-9d01-102091da3b46n@googlegroups.com>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=23055&group=comp.os.vms#23055

  copy link   Newsgroups: comp.os.vms
X-Received: by 2002:a05:620a:22c1:b0:6a3:9974:fd12 with SMTP id o1-20020a05620a22c100b006a39974fd12mr1224191qki.93.1654119897620;
Wed, 01 Jun 2022 14:44:57 -0700 (PDT)
X-Received: by 2002:ad4:5190:0:b0:464:4f18:8f8b with SMTP id
b16-20020ad45190000000b004644f188f8bmr15127557qvp.91.1654119897446; Wed, 01
Jun 2022 14:44:57 -0700 (PDT)
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.mixmin.net!proxad.net!feeder1-2.proxad.net!209.85.160.216.MISMATCH!news-out.google.com!nntp.google.com!postnews.google.com!google-groups.googlegroups.com!not-for-mail
Newsgroups: comp.os.vms
Date: Wed, 1 Jun 2022 14:44:57 -0700 (PDT)
In-Reply-To: <11988c0f-11c0-4cd8-9dbc-3250b32667bbn@googlegroups.com>
Injection-Info: google-groups.googlegroups.com; posting-host=66.210.249.130; posting-account=uNeudQoAAACm0ETOCzPNrvtq-73lRbuD
NNTP-Posting-Host: 66.210.249.130
References: <t51g33$q73$1@dont-email.me> <11988c0f-11c0-4cd8-9dbc-3250b32667bbn@googlegroups.com>
User-Agent: G2/1.0
MIME-Version: 1.0
Message-ID: <fc6dc821-c247-45fb-9d01-102091da3b46n@googlegroups.com>
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
From: jchim...@gmail.com (plugh)
Injection-Date: Wed, 01 Jun 2022 21:44:57 +0000
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
 by: plugh - Wed, 1 Jun 2022 21:44 UTC

On Wednesday, June 1, 2022 at 2:21:46 PM UTC-7, Rich Jordan wrote:
>
> I was on vacation but today at work I was told that Broadcom had bought VMWare and they plan to make it a subscription to run product as quickly as they can.
>
> Wonder how that will impact. Suddenly running a subscription VMS on VMWare might (might! I don't know the prices) be getting more costly.

The crapification of computing technology continues unabated. Broadcom is such a bottom-feeder they bought CA. According to Broadcom, VMWare has too many customers. Broadcom's publicly stated intention (via El Reg) is to mine the customer base, extracting the most valuable veins. Those chumps^H customers are so locked-in to VMWare, they won't be able to switch. If they're also using VMS, cost increases are baked-in as just another cost-of-business to be passed on the taxpayer. For the rest, it's a reminder of why CA grew big enough to be a meal for Broadcom. They can always switch to another hypervisor!
"This port should be no problem, since their computers as the same color as ours."

Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86

<t7a9pc$4it$2@dont-email.me>

  copy mid

https://www.novabbs.com/computers/article-flat.php?id=23065&group=comp.os.vms#23065

  copy link   Newsgroups: comp.os.vms
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: club...@remove_me.eisner.decus.org-Earth.UFP (Simon Clubley)
Newsgroups: comp.os.vms
Subject: Re: VSI Announces Initial Focus on Hypervisor Support for OpenVMS on x86
Date: Thu, 2 Jun 2022 12:17:48 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 21
Message-ID: <t7a9pc$4it$2@dont-email.me>
References: <t51g33$q73$1@dont-email.me> <11988c0f-11c0-4cd8-9dbc-3250b32667bbn@googlegroups.com> <fc6dc821-c247-45fb-9d01-102091da3b46n@googlegroups.com>
Injection-Date: Thu, 2 Jun 2022 12:17:48 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="d82cdc201aa7e90198fb449712963e23";
logging-data="4701"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19NP/TmZGWaz7M57AXkeMzcw18JorVS2AY="
User-Agent: slrn/0.9.8.1 (VMS/Multinet)
Cancel-Lock: sha1:VSZ1MtuFBiSc+cLy8XHNu/6RlAA=
 by: Simon Clubley - Thu, 2 Jun 2022 12:17 UTC

On 2022-06-01, plugh <jchimene@gmail.com> wrote:
> On Wednesday, June 1, 2022 at 2:21:46 PM UTC-7, Rich Jordan wrote:
>>
>> I was on vacation but today at work I was told that Broadcom had bought VMWare and they plan to make it a subscription to run product as quickly as they can.
>>
>> Wonder how that will impact. Suddenly running a subscription VMS on VMWare might (might! I don't know the prices) be getting more costly.
>
> The crapification of computing technology continues unabated. Broadcom is such a bottom-feeder they bought CA. According to Broadcom, VMWare has too many customers. Broadcom's publicly stated intention (via El Reg) is to mine the customer base, extracting the most valuable veins. Those chumps^H customers are so locked-in to VMWare, they won't be able to switch. If they're also using VMS, cost increases are baked-in as just another cost-of-business to be passed on the taxpayer. For the rest, it's a reminder of why CA grew big enough to be a meal for Broadcom. They can always switch to another hypervisor!
> "This port should be no problem, since their computers as the same color as ours."

Not to worry. You can just ask Broadcom for a _full_ datasheet when
you run into problems...

Simon.

PS: In fairness, it's not just them. Ever tried getting a full datasheet
out of FTDI (for example) ?

--
Simon Clubley, clubley@remove_me.eisner.decus.org-Earth.UFP
Walking destinations on a map are further away than they appear.

Pages:12345
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor