Hi Bhupinder,
Sorry I am jumping a bit late in the discussion here.
On 17/07/17 14:06, Bhupinder Thakur wrote:
An option is provided in libxl to enable/disable sbsa vuart while
s/sbsa/SBSA/
creating a guest domain.
Libxl now suppots a generic vuart console and sbsa uart is a specific
Hi,
I am trying to learn how Passthrough works in xen. As an initial step I have tried to do PCI passthrough in my PC with Ubuntu 16.04 LTS (Xenial Xerus) as Dom0 and DomU. For that I had to rebuild the kernel to add xen support and with the procedure explained in,
Hi Bhupinder,
Sorry I am jumping a bit late in the discussion here.
On 17/07/17 14:06, Bhupinder Thakur wrote:
1. Update documentation for a new vuart option added.
2. Update documentation about SPI irq reserved for vuart.
Signed-off-by: Bhupinder Thakur
flight 111973 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111973/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 5fc3889bb3c64f8cd81d7d387f829f146a1998fd
baseline version:
ovmf
Commit-ID: f2f931c6819467af5260a21c59fb787ce2863f92
Gitweb: http://git.kernel.org/tip/f2f931c6819467af5260a21c59fb787ce2863f92
Author: Tom Lendacky
AuthorDate: Mon, 17 Jul 2017 16:10:29 -0500
Committer: Ingo Molnar
CommitDate: Tue, 18 Jul 2017
Hi Bhupinder,
On 17/07/17 14:06, Bhupinder Thakur wrote:
The SBSA UART node format is as specified in
Documentation/devicetree/bindings/serial/arm_sbsa_uart.txt and given below:
ARM SBSA defined generic UART
--
This UART uses a subset of the PL011 registers and
A small correction
> On 18 Jul 2017, at 11:37, Lars Kurth wrote:
>
> ...
> b) The alternative would be for the security team to fix issues in private
> and bundle as we already do and pre-disclose 2 weeks before a fixed monthly
> embargo date. The effect would be
This run is configured for baseline tests only.
flight 71700 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71700/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-ovmf-amd64 15
branch xen-unstable
xenbranch xen-unstable
job test-amd64-amd64-xl
testid guest-localmigrate
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu
Now there is no need to update shadow EPTP after handling L2 EPT
violation since all EPTP updates are handled by nvmx_eptp_update().
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/hvm/vmx/vmx.c | 6 --
1 file changed, 6 deletions(-)
diff --git
Now that np2m sharing is implemented, there can be only one np2m object
with the same np2m_base. Break from loop if the required np2m was found
during np2m_flush_eptp().
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/p2m.c | 3 +++
xen/include/asm-x86/p2m.h | 2
Modify p2m_get_nestedp2m() to allow sharing a np2m between multiple
vcpus with the same np2m_base (L1 EPTP value in VMCS12).
np2m_schedule_in/out() callbacks are added to context_switch() as well
as pseudo schedule-out is performed during virtual_vmexit().
Signed-off-by: Sergey Dyasli
On 18/07/17 10:49, Sergej Proskurin wrote:
Hi Julien,
Hello Sergej,
On 07/17/2017 05:38 PM, Julien Grall wrote:
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
This commit moves the function vgic_access_guest_memory to guestcopy.c
and the header asm/guest_access.h. No functional
Hi all,
on the following topic in session http://sched.co/AjHl we discussed the
following issues
Here are my notes
ACTIONS for
* Julien Grall/Stefano Stabellini
* Andrew Cooper
* Ian Jackson
* Lars Kurth
* Security team members
Regards
Lars
= Consolidate Security Coverage Documents for CNA =
On Tue, Jul 18, 2017 at 11:33:04AM +0100, Wei Liu wrote:
> On Wed, Jul 12, 2017 at 10:04:40AM +0800, Haozhong Zhang wrote:
> >
> > +static int inject_lmce(xc_interface *xc_handle, unsigned int cpu)
> > +{
> > +uint8_t *cpumap = NULL;
> > +size_t cpumap_size, line, shift;
> > +
The new function finds all np2m objects with the specified eptp and
flushes them. p2m_flush_table_locked() is added in order not to release
the p2m lock after np2m_base check.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/p2m.c | 34
The new function returns still write-locked np2m.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/p2m.c | 12 +---
xen/include/asm-x86/p2m.h | 2 ++
2 files changed, 11 insertions(+), 3 deletions(-)
diff --git a/xen/arch/x86/mm/p2m.c
Add np2m_generation variable to both p2m_domain and nestedvcpu.
np2m's generation will be incremented each time the np2m is flushed.
This will allow to detect if a nested vcpu has the stale np2m.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/hvm/nestedhvm.c | 1 +
1. Add a helper function assign_np2m()
2. Remove useless volatile
3. Update function's comment in the header
4. Minor style fixes ('\n' and d)
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/p2m.c | 31 ++-
xen/include/asm-x86/p2m.h |
np2m maintenance is required for a nested vcpu during scheduling:
1. On schedule-out: clear pCPU's bit in p2m->dirty_cpumask
to prevent useless IPIs.
2. On schedule-in: check if np2m is up to date and wasn't flushed.
Signed-off-by: Sergey Dyasli
nvmx_handle_invept() updates current's np2m just to flush it. Instead,
use the new np2m_flush_eptp() directly for this purpose.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/hvm/vmx/vvmx.c | 7 +--
1 file changed, 1 insertion(+), 6 deletions(-)
diff --git
Remove np2m_base parameter as it should always match the value of
EPTP in VMCS12.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/hvm/svm/nestedsvm.c | 2 +-
xen/arch/x86/hvm/vmx/vvmx.c | 3 +--
xen/arch/x86/mm/hap/nested_hap.c | 2 +-
xen/arch/x86/mm/p2m.c
Nested p2m (shadow EPT) is an object that stores memory address
translations from L2 GPA directly to L0 HPA. This is achieved by
combining together L1 EPT tables with L0 EPT during L2 EPT violations.
In the usual case, L1 uses the same EPTP value in VMCS12 for all vCPUs
of a L2 guest. But
This commit substitutes the direct access of the host's p2m
(>arch.p2m) for the macro "p2m_get_hostp2m". This macro simplifies
readability and also the differentiation between the host's p2m and
alternative p2m's, i.e., as part of the altp2m subsystem that will be
submitted in the future.
There is a possibility for nested_p2m to became stale between
nestedhvm_hap_nested_page_fault() and nestedhap_fix_p2m(). Simply
use p2m_get_nestedp2m_lock() to guarantee that correct np2m is used.
Signed-off-by: Sergey Dyasli
---
xen/arch/x86/mm/hap/nested_hap.c | 29
The new variable will indicate if update of a shadow EPTP is needed
prior to vmentry. Update is required if a nested vcpu gets a new np2m
or if its np2m was flushed by an IPI.
Helper function nvcpu_flush() is added.
Signed-off-by: Sergey Dyasli
---
On Wed, Jul 12, 2017 at 10:04:40AM +0800, Haozhong Zhang wrote:
>
> +static int inject_lmce(xc_interface *xc_handle, unsigned int cpu)
> +{
> +uint8_t *cpumap = NULL;
> +size_t cpumap_size, line, shift;
> +unsigned int nr_cpus;
> +int ret;
> +
> +nr_cpus =
On 18/07/17 09:42, Sergej Proskurin wrote:
Hi Julien,
On 07/17/2017 05:43 PM, Julien Grall wrote:
Hi Sergej,
On 06/07/17 12:50, Sergej Proskurin wrote:
This commit renames the function vgic_access_guest_memory to
access_guest_memory_by_ipa. As the function name suggests, the functions
On Tue, Jul 18, 2017 at 08:36:15PM +1200, Huang, Kai wrote:
>
>
> On 7/17/2017 10:54 PM, Roger Pau Monné wrote:
> > On Sun, Jul 09, 2017 at 08:16:05PM +1200, Kai Huang wrote:
> > > On physical machine EPC is exposed in ACPI table via "INT0E0C". Although
> > > EPC
> > > can be discovered by
On 07/18/2017 01:09 PM, Andrew Cooper wrote:
> On 18/07/17 10:37, Petre Pircalabu wrote:
>> If case of a vm_event with the emulate_flags set, if the instruction
>> cannot be emulated, the monitor should be notified instead of directly
>> injecting a hw exception.
>> This behavior can be used to
On 09/07/17 09:04, Kai Huang wrote:
> Expose SGX in CPU featureset for HVM domain. SGX will not be supported for
> PV domain, as ENCLS (which SGX driver in guest essentially runs) must run
> in ring 0, while PV kernel runs in ring 3. Theoretically we can support SGX
> in PV domain via either
On 18/07/17 10:37, Petre Pircalabu wrote:
> If case of a vm_event with the emulate_flags set, if the instruction
> cannot be emulated, the monitor should be notified instead of directly
> injecting a hw exception.
> This behavior can be used to re-execute an instruction not supported by
> the
On Tue, Jul 18, 2017 at 12:37:32PM +0300, Petre Pircalabu wrote:
> If case of a vm_event with the emulate_flags set, if the instruction
> cannot be emulated, the monitor should be notified instead of directly
> injecting a hw exception.
> This behavior can be used to re-execute an instruction not
> -Original Message-
> From: Petre Pircalabu [mailto:ppircal...@bitdefender.com]
> Sent: 18 July 2017 10:38
> To: xen-devel@lists.xen.org
> Cc: rcojoc...@bitdefender.com; ta...@tklengyel.com; Ian Jackson
> ; Wei Liu ; Paul Durrant
>
Dear Shishir,
On 18.07.17 12:05, shishir tiwari wrote:
Hi
I want test and understand xen hypervisor implementation with dom0 and
domU on omap5 board.
I followed
https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
with latest kernel(4.11.7) and xen(4.9.0)
Hi Julien,
On 07/17/2017 05:38 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 06/07/17 12:50, Sergej Proskurin wrote:
>> This commit moves the function vgic_access_guest_memory to guestcopy.c
>> and the header asm/guest_access.h. No functional changes are made.
>> Please note that the function will
Dear Christopher,
On 18.07.17 12:08, Andrii Anisov wrote:
In order to build the required system, a board candidate should:
- have a CPU able to switch to EL2/Virtualization mode
- have a public bootloader sources able to switch CPU to
EL2/Virtualizaiotn mode
- have a Linux system
This run is configured for baseline tests only.
flight 71697 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71697/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl-credit2 20
If case of a vm_event with the emulate_flags set, if the instruction
cannot be emulated, the monitor should be notified instead of directly
injecting a hw exception.
This behavior can be used to re-execute an instruction not supported by
the emulator using the real processor (e.g. altp2m) instead
Dear George John,
On 17.07.17 09:59, George John wrote:
I have a r-car H3 board with Dom0 and two DomU's.
Are you speaking about Salvator-X or H3ULCB?
Do we have to passthrough one of the hdmi ports to the one guest if we
could implement GPU sharing between Dom0 and one DomU in r-car h3
On 17/07/17 19:18, Julien Grall wrote:
> "THE REST" maintainers should always be CCed for any modification that
> don't fall under the responsability of a specific component maintainer.
>
> However, the script get_maintainers.pl will remove "THE REST"
> maintainers as soon as one maintainer of a
Dear Christopher,
On 14.07.17 00:39, Christopher Lambert wrote:
I would like to test xen on an ARM target with one linux (as dom0) and
one android (as domU).
As I know there were built such setups on Renesas R-Car H2 and H3, and
TI DRA7xx based boards (Lager, Salvator-X and Jacinto6 EVM board
Hi
I want test and understand xen hypervisor implementation with dom0 and domU
on omap5 board.
I followed
https://wiki.xenproject.org/wiki/Xen_ARM_with_Virtualization_Extensions/OMAP5432_uEVM
with latest kernel(4.11.7) and xen(4.9.0) and device tree and but unable to
boot dom0.
xen stop on
On Tue, Jul 18, 2017 at 08:40:18AM +0100, Roger Pau Monné wrote:
> On Tue, Jul 18, 2017 at 08:53:28AM +0800, Ming Lei wrote:
> > On Mon, Jul 17, 2017 at 05:02:27PM +0100, Roger Pau Monné wrote:
> > > On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote:
> > > > On Mon, Jul 17, 2017 at
> -Original Message-
> From: Roger Pau Monne [mailto:roger@citrix.com]
> Sent: 30 June 2017 16:01
> To: xen-de...@lists.xenproject.org
> Cc: boris.ostrov...@oracle.com; julien.gr...@arm.com;
> konrad.w...@oracle.com; Roger Pau Monne ; Jan
> Beulich
Hi Julien,
On 07/17/2017 05:43 PM, Julien Grall wrote:
> Hi Sergej,
>
> On 06/07/17 12:50, Sergej Proskurin wrote:
>> This commit renames the function vgic_access_guest_memory to
>> access_guest_memory_by_ipa. As the function name suggests, the functions
>> expects an ipa as argument. Thus, to
On 7/17/2017 10:54 PM, Roger Pau Monné wrote:
On Sun, Jul 09, 2017 at 08:16:05PM +1200, Kai Huang wrote:
On physical machine EPC is exposed in ACPI table via "INT0E0C". Although EPC
can be discovered by CPUID but Windows driver requires EPC to be exposed in
ACPI table as well. This patch
flight 111939 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111939/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-stubdom-debianhvm-amd64-xsm 7 xen-boot fail REGR.
vs. 110515
Hi Wei,
Thank you very much for comments. Please see my reply below.
On 7/17/2017 9:16 PM, Wei Liu wrote:
Hi Kai
Thanks for this nice write-up.
Some comments and questions below.
On Sun, Jul 09, 2017 at 08:03:10PM +1200, Kai Huang wrote:
Hi all,
[...]
2. SGX Virtualization Design
2.1
This run is configured for baseline tests only.
flight 71698 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/71698/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf d4f6c35c84b8503bc2acde89a7adb7ee05c56516
baseline
On Mon, 17 Jul 2017, Juergen Gross wrote:
> Instead of fiddling with masking the event channels during suspend
> and resume handling let do the irq subsystem do its job. It will do
> the mask and unmask operations as needed.
>
> Signed-off-by: Juergen Gross
Acked-by: Thomas
On 11/07/17 21:41, Colin King wrote:
> From: Colin Ian King
>
> Currently a sock_release on map->sock will result in a null pointer
> deference on map when map is null. Instead, the sock_relase sould
> be on sock and not map->sock.
>
> Detected by CoverityScan,
On 07/07/17 20:23, Wengang Wang wrote:
> log a message when we enter this situation:
> 1) we already allocated the max number of available grants from hypervisor
> and
> 2) we still need more (but the request fails because of 1)).
>
> Sometimes the lack of grants causes IO hangs in xen_blkfront
On 26/06/17 18:39, Vitaly Kuznetsov wrote:
> CONFIG_BOOTPARAM_HOTPLUG_CPU0 allows to offline CPU0 but Xen HVM guests
> BUG() in xen_teardown_timer(). Remove the BUG_ON(), this is probably a
> leftover from ancient times when CPU0 hotplug was impossible, it works
> just fine for HVM.
>
>
> -Original Message-
> From: Petre Pircalabu [mailto:ppircal...@bitdefender.com]
> Sent: 17 July 2017 17:47
> To: xen-devel@lists.xen.org
> Cc: rcojoc...@bitdefender.com; ta...@tklengyel.com; Ian Jackson
> ; Wei Liu ; Paul Durrant
>
On Tue, Jul 18, 2017 at 08:53:28AM +0800, Ming Lei wrote:
> On Mon, Jul 17, 2017 at 05:02:27PM +0100, Roger Pau Monné wrote:
> > On Mon, Jul 17, 2017 at 11:06:28PM +0800, Ming Lei wrote:
> > > On Mon, Jul 17, 2017 at 12:20:56PM +0100, Roger Pau Monné wrote:
> > > > seems fairly easy to mess up and
On 07/07/17 20:23, Wengang Wang wrote:
> log a message when we enter this situation:
> 1) we already allocated the max number of available grants from hypervisor
> and
> 2) we still need more (but the request fails because of 1)).
>
> Sometimes the lack of grants causes IO hangs in xen_blkfront
On 12/07/17 09:25, Dan Carpenter wrote:
> We accidentally dereference "map" when it's NULL.
>
> Fixes: b535e2b9b78a ("xen/pvcalls: implement connect command")
> Signed-off-by: Dan Carpenter
The patch is okay, but the very same one has already been sent before.
I'll
flight 111959 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/111959/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf 357c48258e0b452d31f487a47dca486ba666a954
baseline version:
ovmf
Let there be two domU's - domU (1) and domU (2)
Is there a way domU (1) can find the UUID of domU (2) ?
Please tell.
Thanks.
--
View this message in context:
http://xen.1045712.n5.nabble.com/Is-there-a-way-domU-1-can-find-the-UUID-of-domU-2-tp5737307.html
Sent from the Xen - Dev mailing list
201 - 260 of 260 matches
Mail list logo