On Mon, Dec 3, 2018 at 8:49 AM Chris Patterson wrote:
>
> > == Future items
> >
> > The Linux device driver used to test this software is derived from the
> > OpenXT v4v Linux device driver, available at:
> > https://github.com/OpenXT/v4v
> > The Argo implementation is not yet ready to publish
On Sun, Dec 2, 2018 at 11:55 AM Julien Grall wrote:
>
> Hi,
>
> On 01/12/2018 01:33, Christopher Clark wrote:
> > * x86 PV domains are notified via event channel.
> >
> > PV guests are known to have the event channel software present in the guest
> > kernel, s
On Sun, Dec 2, 2018 at 12:11 PM Julien Grall wrote:
>
>
>
> On 01/12/2018 01:32, Christopher Clark wrote:
> > diff --git a/xen/include/public/argo.h b/xen/include/public/argo.h
> > index 20dabc0..5ad8e2b 100644
> > --- a/xen/include/public/argo.h
> > +++ b/xe
On Mon, Dec 3, 2018 at 7:42 AM Jan Beulich wrote:
>
> >>> On 01.12.18 at 02:32, wrote:
> > http://pubs.opengroup.org/onlinepubs/9699919799/basedefs/errno.h.html
> > describes these codes thus:
> > EMSGSIZE : "Message too large"
> > ECONNREFUSED : "Connection refused".
>
> If you were
On Mon, Dec 3, 2018 at 7:51 AM Jan Beulich wrote:
>
> >>> On 01.12.18 at 02:32, wrote:
> > --- a/xen/common/Kconfig
> > +++ b/xen/common/Kconfig
> > @@ -200,6 +200,26 @@ config LATE_HWDOM
> >
> > If unsure, say N.
> >
> > +config ARGO
> > +bool "Argo: hypervisor-mediated interdomain c
On Mon, Dec 3, 2018 at 8:20 AM Jan Beulich wrote:
>
> >>> On 01.12.18 at 02:32, wrote:
> > Allocates an IPI-bound event channel on vcpu0 for specified domain.
>
> Please can such changes to general code be done at the point where
> they're needed?
>
> > Is able to bypass the existence check on vc
On Tue, Dec 4, 2018 at 10:11 AM Chris Brannon wrote:
>
> Hi,
> I set up a network driver domain for a dom0; it uses HVM
> virtualization. It worked very well when not using a device model
> stubdomain, but when I requested the use of a device model stubdomain in
> my xl.cfg file, the domU refused
On Wed, Dec 5, 2018 at 9:20 AM Julien Grall wrote:
> On 04/12/2018 09:08, Christopher Clark wrote:
> > On Sun, Dec 2, 2018 at 12:11 PM Julien Grall wrote:
> >> On 01/12/2018 01:32, Christopher Clark wrote:
> >>> diff --git a/xen/include/public/argo
On Tue, Dec 4, 2018 at 1:44 AM Paul Durrant wrote:
>
> > -Original Message-
> > From: Christopher Clark [mailto:christopher.w.cl...@gmail.com]
> > Sent: 01 December 2018 01:33
> > To: xen-devel@lists.xenproject.org
> > Subject: [PATCH 03/25] argo: introd
On Wed, Dec 12, 2018 at 8:03 AM Roger Pau Monné wrote:
>
> On Fri, Nov 30, 2018 at 05:32:46PM -0800, Christopher Clark wrote:
> > Applied to both x86 and ARM headers.
> >
> > Signed-off-by: Christopher Clark
> > ---
> > xen/include/asm-arm/guest_access.h | 2
On Tue, Dec 4, 2018 at 1:52 AM Paul Durrant wrote:
>
> > -Original Message-
> > From: Christopher Clark [mailto:christopher.w.cl...@gmail.com]
> > Sent: 01 December 2018 01:33
> > To: xen-devel@lists.xenproject.org
> > Cc: Andrew Cooper ; George Dunlap
&g
On Wed, Dec 12, 2018 at 1:48 AM Jan Beulich wrote:
>
> > +static int
> > +argo_find_ring_mfns(struct domain *d, struct argo_ring_info *ring_info,
> > +uint32_t npage, XEN_GUEST_HANDLE_PARAM(argo_pfn_t)
> > pfn_hnd,
> > +uint32_t len)
> > +{
> > +int i;
On Wed, Dec 12, 2018 at 8:48 AM Roger Pau Monné wrote:
>
> On Fri, Nov 30, 2018 at 05:32:52PM -0800, Christopher Clark wrote:
> > +static inline uint16_t
> > +argo_hash_fn(const struct argo_ring_id *id)
>
> No need for the argo_ prefix for static functions, this is already
On Wed, Dec 12, 2018 at 3:53 AM Jan Beulich wrote:
>
> >>> On 01.12.18 at 02:32, wrote:
> > +static void
> > +argo_signal_domain(struct domain *d)
> > +{
> > +argo_dprintk("signalling domid:%d\n", d->domain_id);
> > +
> > +if ( !d->argo ) /* This can happen if the domain is being destroye
On Thu, Dec 13, 2018 at 6:06 AM Jan Beulich wrote:
>
> >>> On 01.12.18 at 02:32, wrote:
> > +static uint32_t
> > +argo_ringbuf_payload_space(struct domain *d, struct argo_ring_info
> > *ring_info)
> > +{
> > +argo_ring_t ring;
> > +int32_t ret;
> > +
> > +ASSERT(spin_is_locked(&ring_
On Thu, Dec 13, 2018 at 6:16 AM Jan Beulich wrote:
>
> >>> On 01.12.18 at 02:33, wrote:
> > * x86 PV domains are notified via event channel.
> >
> > PV guests are known to have the event channel software present in the guest
> > kernel, so it is fine to depend on and use it.
> >
> > * x86 HVM dom
On Thu, Dec 13, 2018 at 6:26 AM Jan Beulich wrote:
>
> >>> On 01.12.18 at 02:33, wrote:
> > so that the guest may re-register the rings on resume with current mappings.
>
> Is this something guests really need help with, rather than managing
> it on their own? What does "current mappings" here me
.
Applied to both x86 and ARM headers.
Signed-off-by: Christopher Clark
---
v1 #7 feedback, Paul: corrected and significantly simplified implementation
The need for this interface was questioned during the first series review,
(which wasn't much helped by the implementation or commit message
:
DECLARE_XEN_GUEST_HANDLE_NULL(type);
This will define a const variable at the given static or auto scope which is
then utilized to supply the NULL-with-correct-type value when
XEN_GUEST_HANDLE_NULL is used.
Signed-off-by: Christopher Clark
---
v1 #8 feedback Jan:
parenthesize XEN_GUEST_HANDLE_NULL
e for its bucket distribution properties to cluster
related rings rather than for cryptographic strength or any uniformness of
output, and it operates upon values supplied by the guest just before being
used as an array index.
Signed-off-by: Christopher Clark
---
Changes since v1:
v1 #13 feedback
EMSGSIZE : "Message too large"
ECONNREFUSED : "Connection refused".
Signed-off-by: Christopher Clark
---
xen/include/public/errno.h | 2 ++
1 file changed, 2 insertions(+)
diff --git a/xen/include/public/errno.h b/xen/include/public/errno.h
index 305c112..e1d02fc 100644
--- a/xe
Default policy: allow.
Signed-off-by: Christopher Clark
---
v1 version was:
Reviewed-by: Paul Durrant
but this has been modified since v1 based on Jan's feedback to apply const
to function signatures.
=> Paul, does the Reviewed-by still stand?
xen/include/xsm/dummy.h
Signed-off-by: Christopher Clark
---
xen/common/argo.c | 11 +++
1 file changed, 11 insertions(+)
diff --git a/xen/common/argo.c b/xen/common/argo.c
index 1f16872..921aaf3 100644
--- a/xen/common/argo.c
+++ b/xen/common/argo.c
@@ -1115,6 +1115,17 @@ argo_fill_ring_data(const struct
tive strings in
order to make it obvious to an administrator that this has potential
security impact.
Modifies the signature of core XSM hook functions in order to apply 'const'
to arguments, needed in order for 'const' to be accepted in signature of
functions that invoke them.
A convenience for working on development of the argo subsystem:
toggling a local #define variable turns on just the debug messages
in this subsystem.
Signed-off-by: Christopher Clark
---
Changes since v1:
v1 #04 feedback, Jan:
remove do-while from definition
fully parenthesize the macro
to reduce VMEXIT load.
* delivering extended notification data via a dedicated registered ring
will allow a guest to avoid a search to identify notification causes.
Additional items will be noted on the Xen wiki.
== Credits
Contributors to the design and implementation of this software include
er is the BSD license, standard
procedure for the public Xen headers.
A count will be maintained of the number of rings that a domain has
registered in order to limit it below the fixed maximum limit defined here.
Signed-off-by: Christopher Clark
---
Changes since v1:
v1 #5 feedback Paul: init/des
: Christopher Clark
---
Changes since v1:
v1. feedback #15 Jan: make i unsigned
v1. self: fix indentation and blank lines
v1. feedback #25 Jan: add rationale to commit message
re: v1 feedback #25 Jan: soft-reset is now not a problem for the resume logic
in this commit since handling of soft reset was
Signed-off-by: Christopher Clark
---
Changes since v1:
Change the default to disabled.
Make the prompt depend on EXPERT.
Fix tab-based indentation.
xen/common/Kconfig | 20
1 file changed, 20 insertions(+)
diff --git a/xen/common/Kconfig b/xen/common/Kconfig
index 68132a3
to be integer multiples of 32 bits in size. This means that the same
copy_to_guest and copy_from_guest logic can be relied upon to perform as
required without any further intervention. Testing communication with 32
and 64 bit guests has confirmed this works as intended.
Signed-off-by: Christopher
ARM port of c/s bb544585: "introduce guest_handle_for_field()"
This helper turns a field of a GUEST_HANDLE into a GUEST_HANDLE.
Signed-off-by: Christopher Clark
Reviewed-by: Paul Durrant
---
v1 10 feedback Paul: improve commit message, add R-by
xen/include/asm-arm/guest_access.h
lso likely to
simplify establishing future L0/L1 nested hypervisor argo communication.
Signed-off-by: Christopher Clark
---
Changes since v1:
v1 #15 feedback, Jan: sendv op : s/ECONNREFUSED/ESRCH/ if ! dest dom
v1 #5 (#15) feedback Paul: sendv: use currd in do_argo_message_op
v1 #13 (#15) feedback P
ith
a simple fixed limit of 256.
Signed-off-by: Christopher Clark
---
Changes since v1:
v1 #5 (#16) feedback Paul: notify op: use currd in do_argo_message_op
v1 #5 (#16) feedback Paul: notify op: use currd in argo_notify
v1 #5 (#16) feedback Paul: notify op: use currd in argo_notify_check_pending
Takes a single argument: a handle to the registered ring.
The ring's entry is removed from the hashtable of registered rings;
any entries for pending notifications are removed; and the ring is
unmapped from Xen's address space.
Signed-off-by: Christopher Clark
---
Changes since v1:
structures; the coverage of offset of elements is still retained.
Signed-off-by: Christopher Clark
---
This is a new patch introduced in version 2 of the series.
These checks could be introduced incrementally in multiple previous commits as
the data structures are added with each hypercall op
Will inhibit initialization of the domain's argo data structure to
prevent receiving any messages or notifications and access to any of
the argo hypercall operations.
Signed-off-by: Christopher Clark
---
Changes since v1:
v1 #5 (#17) feedback Paul: XSM control for any access: use currd
v
On Thu, Dec 20, 2018 at 3:20 AM Julien Grall wrote:
>
> Hi Christopher,
>
> On 12/20/18 6:39 AM, Christopher Clark wrote:
> > Used by a domain to register a region of memory for receiving messages from
> > either a specified other domain, or, if specifying a wildcard,
On Thu, Dec 20, 2018 at 12:29 AM Jan Beulich wrote:
>
> >>> On 20.12.18 at 06:29, wrote:
> > On Wed, Dec 12, 2018 at 1:48 AM Jan Beulich wrote:
> >>
> >> > +static int
> >> > +argo_find_ring_mfns(struct domain *d, struct argo_ring_info *ring_info,
> >> > +uint32_t npage, XEN_
On Thu, Dec 20, 2018 at 11:28 PM Jan Beulich wrote:
>
> >>> On 21.12.18 at 02:25, wrote:
> > On Thu, Dec 20, 2018 at 12:29 AM Jan Beulich wrote:
> >>
> >> >>> On 20.12.18 at 06:29, wrote:
> >> > On Wed, Dec 12, 2018 at 1:48 AM Jan Beulich wrote:
> >> >>
> >> >> > +static int
> >> >> > +argo_fi
On Thu, Dec 20, 2018 at 4:52 AM Roger Pau Monné wrote:
>
> On Wed, Dec 19, 2018 at 09:41:59PM -0800, Christopher Clark wrote:
> > On Wed, Dec 12, 2018 at 8:48 AM Roger Pau Monné
> > wrote:
> > >
> > > On Fri, Nov 30, 2018 at 05:32:52PM -0800, Christopher
On Fri, Dec 21, 2018 at 12:53 AM Jan Beulich wrote:
>
> >>> On 21.12.18 at 09:16, wrote:
> > On Thu, Dec 20, 2018 at 11:28 PM Jan Beulich wrote:
> >>
> >> >>> On 21.12.18 at 02:25, wrote:
> >> > On Thu, Dec 20, 2018 at 12:29 AM Jan Beulich wrote:
> >> >>
> >> >> >>> On 20.12.18 at 06:29, wrot
/wiki.xenproject.org/wiki/Driver_Domain>https://www.slideshare.net/xen_com_mgr/the-openxt-project-in-2016-christopher-clark-bae-systems/15
<https://www.slideshare.net/xen_com_mgr/the-openxt-project-in-2016-christopher-clark-bae-systems/15>https://www.qubes-os.org/doc/networking/
<https:/
gcc-8.1 complains:
| xentop.c: In function 'print':
| xentop.c:304:4: error: 'vwprintw' is deprecated
[-Werror=deprecated-declarations]
| vwprintw(stdscr, (curses_str_t)fmt, args);
| ^~~~
vw_printw (note the underscore) is a non-deprecated alternative.
Signed
fore-set in one location where it is
defined in xen/arch/x86/Rules.mk ; this patch applies the same to the
other define site in the same file.
__OBJECT_FILE__ is handled similarly: an undefine statement is added
before its definition in xen/Rules.mk
Signed-off-by: Christopher Clark
---
Pleas
On Wed, Jul 4, 2018 at 3:41 AM, Jan Beulich wrote:
> All,
>
> this is supposed to go out in about 3 weeks time. Please point out backport
> candidates you find missing from its staging branch, but which you consider
> relevant.
>
Marek's patches below are each straightforward and enable clean b
:00 PM >>>
> > >> >On Thu, 19 Jul 2018, Jan Beulich wrote:
> > >> >> > Signed-off-by: Christopher Clark baesystems.com>
> > >> >> > ---
> > >> >> > Please use my gmail address for any correspondence to me.
>
an unnecessary rebuild of the shim during
"make install".
Signed-off-by: Christopher Clark
---
tools/firmware/xen-dir/Makefile | 6 +-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/tools/firmware/xen-dir/Makefile b/tools/firmware/xen-dir/Makefile
index 84648c3..e49
On Mon, Jul 23, 2018 at 2:26 AM, Andrew Cooper
wrote:
> On 23/07/18 10:09, Roger Pau Monné wrote:
> > On Fri, Jul 20, 2018 at 02:15:05PM -0700, Christopher Clark wrote:
> >> Exclude named output files from the Xen tree setup.
> >>
> >> The linkfarm.stamp c
invocations, due to the introduction of these
> > output files that are produced during the "make" build.
> >
> > Filter these out to prevent an unnecessary rebuild of the shim during
> > "make install".
> >
> > Signed-off-by: Christopher
an unnecessary rebuild of the shim
during "make install".
Signed-off-by: Christopher Clark
---
v2: added xen.efi, xen.efi.map to the exclusion list
tools/firmware/xen-dir/Makefile | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/tools/firmware/xen-dir/Makefile
On Wed, Jul 25, 2018 at 1:53 AM, Wei Liu wrote:
> On Wed, Jul 25, 2018 at 09:49:39AM +0100, Wei Liu wrote:
> > On Sat, Jul 21, 2018 at 02:14:12AM +0200, Marek Marczykowski-Górecki
> wrote:
> >
> > > +
> > > + memcpy(dest, buf, len);
> > > + for (i = 0; i < len; i++) {
> > > + if (de
On Wed, Jul 25, 2018 at 1:10 AM, Jan Beulich wrote:
> >>> On 25.07.18 at 02:28, wrote:
> > --- a/tools/firmware/xen-dir/Makefile
> > +++ b/tools/firmware/xen-dir/Makefile
> > @@ -11,6 +11,10 @@ D=xen-root
> > LINK_DIRS=config xen
> > LINK_FILES=Config.mk
> >
> > +# Files to exclude from the li
an unnecessary rebuild of the shim
during "make install", after "make" within a fresh source tree.
Excluded from consideration with this change: differences in stamp
content when performing incremental builds in an existing tree.
Signed-off-by: Christopher Clark
---
Chan
On Fri, Jul 27, 2018 at 1:34 AM, Jan Beulich wrote:
> >>> On 26.07.18 at 23:16, wrote:
> > Exclude named output files from the Xen tree setup.
> >
> > The linkfarm.stamp content will differ between top level "make"
> > and "make install" invocations, due to the introduction of these
> > output f
On Tue, Aug 7, 2018 at 2:26 AM, Lars Kurth wrote:
> Dear community members,
>
> please send me agenda items for next week’s community call by this Friday.
>
>
If there is time available on the call, I'd like to ask about Xen's memory
scrubbing, to better understand the changes made to it in recen
Hello,
Mixed-criticality and safety-critical systems under development need
support for timely boot of multiple domains at system launch -- “Initial
Domains” -- with static assignment of resources between them, each isolated
from the others and without runtime dependency on a “dom0”-type domain.
Add zero-padding to #defined ACPI table strings that are copied.
Provides sufficient characters to satisfy the length required to
fully populate the destination and prevent array-bounds warnings.
Signed-off-by: Christopher Clark
---
Please add this patch to the backport list for the next minor
On Wed, Aug 15, 2018 at 11:17 PM, Juergen Gross wrote:
> In the Xen x86 community call we have been discussing whether anyone
> really is depending on 32-bit PV guests. We'd like to evaluate whether
> anyone would see problems with:
>
> - deprecating 32-bit PV guest support in Xen, meaning that w
On Thu, Aug 16, 2018 at 12:55 AM, Juergen Gross wrote:
> On 16/08/18 08:51, Jan Beulich wrote:
> On 16.08.18 at 08:32, wrote:
> >> On Wed, Aug 15, 2018 at 11:17 PM, Juergen Gross
> wrote:
> >>
> >>> In the Xen x86 community call we have been discussing whether anyone
> >>> really is depend
Add zero-padding to #defined ACPI table strings that are copied.
Provides sufficient characters to satisfy the length required to
fully populate the destination and prevent array-bounds warnings.
Add BUILD_BUG_ON sizeof checks for compile-time length checking.
Signed-off-by: Christopher Clark
~~~~~~~~
| cc1: all warnings being treated as errors
Signed-off-by: Christopher Clark
---
tools/xenpmd/xenpmd.c | 6 --
1 file changed, 4 insertions(+), 2 deletions(-)
diff --git a/tools/xenpmd/xenpmd.c b/tools/xenpmd/xenpmd.c
index 56412a9..0c0787
On Mon, Aug 20, 2018 at 7:21 AM, Wei Liu wrote:
> On Fri, Aug 17, 2018 at 06:22:16PM -0700, Christopher Clark wrote:
>>
>> Prior to this change, building fails with the compiler warning:
>>
>> | xenpmd.c: In function 'write_battery_info_to_xenstore':
>>
e variables are obfuscating incorrect logic, so
strip them out and match existing code for xen-watchdog which does work.
Signed-off-by: Christopher Clark
---
These defects were found while reviewing Doug Goldstein's patch to remove
tboot, which touches 'uninstall' in the top level Makefile.
*** [subdir-uninstall-x86_emulator] Error 2
| make[5]: Leaving directory './git/tools/tests'
|
| ./git/tools/tests/../../tools/Rules.mk:249: recipe for target
'subdir-uninstall-x86_emulator' failed
so I've just posted a patch that fixes this and anot
On Tue, Sep 4, 2018 at 2:07 AM Jan Beulich wrote:
>
> >>> On 04.09.18 at 09:32, wrote:
> > Am Mon, 03 Sep 2018 06:35:42 -0600
> > schrieb "Jan Beulich" :
> >
> >> what is the actual problem? The mere
> >> listing of compiler flags passed does not make clear to me where the clash
> >> is, or how i
inclusion of stdio.h, string.h
Adds necessary (previously missing) #include to x86-emulate.h
Signed-off-by: Christopher Clark
---
tools/fuzz/x86_instruction_emulator/fuzz-emul.c | 4 ++--
tools/tests/x86_emulator/wrappers.c | 3 ++-
tools/tests/x86_emulator/x86-emulate.h
On Mon, Sep 24, 2018 at 5:06 AM Jan Beulich wrote:
>
> >>> On 21.09.18 at 21:25, wrote:
> >
> > Adds necessary (previously missing) #include to x86-emulate.h
>
> Why "necessary (previously missing)"? I can't seem to be able to
> spot anything in that header that would depend on stdio.h.
When WR
#include to x86-emulate.h because fwrite, printf,
etc. are referenced when WRAP has been defined.
Signed-off-by: Christopher Clark
---
Changes in v2:
* Added comment to explain the deliberate ordering of includes that might
otherwise be believed to be incorrect.
* Added comment to explain the
On Wed, Sep 26, 2018 at 1:43 AM Wei Liu wrote:
>
> On Wed, Sep 26, 2018 at 02:03:36AM -0600, Jan Beulich wrote:
> > There was another stdio.h inclusion left in place. Re-order #include-s
> > altogether in test_x86_emulator.c.
> >
> > Signed-off-by: Jan Beulich
>
> Reviewed-by: Wei Liu
> Tested-b
using Argo with Xen. This will provide a way to use VirtIO
device drivers within Xen guest VMs with strong isolation properties.
This work has been developed by Christopher Clark, Daniel Smith and Rich
Persaud, with Eric Chanudet and Nick Krasnoff.
Christopher is the primary author of this version of
On Thu, Oct 1, 2020 at 7:38 AM Bertrand Marquis
wrote:
>
> Hi George,
>
> + Christopher Clark to have his view on what to put for Yocto.
>
> > On 30 Sep 2020, at 13:57, George Dunlap wrote:
> >
> > Define a specific criteria for how we determine what tools and
&g
Roger: thanks for your interest and fast response to the first post in
this thread. Responses inline below.
On Thu, Oct 1, 2020 at 1:55 AM Roger Pau Monné wrote:
>
> On Wed, Sep 30, 2020 at 09:03:03PM -0700, Christopher Clark wrote:
> > Hello
> >
> > Following up on a
On Thu, Apr 30, 2020 at 3:28 PM Marek Marczykowski-Górecki
wrote:
>
> On Wed, Apr 29, 2020 at 05:51:08PM -0500, Bobby Eshleman wrote:
> > # Option #3: Lean on Grub2's LoadFile2() Verification
> >
> > Grub2 will provide a LoadFile2() method to subsequent programs that supports
> > signature verific
Adds a design document for DomB.
Signed-off-by: Christopher Clark
Signed-off by: Daniel P. Smith
---
This is a Request for Comments on this draft design document which
describes the motivation and design for the funded development of domB.
We invite discussion of this on this month’s Xen
On Thu, May 7, 2020 at 1:15 AM Jan Beulich wrote:
>
> On 06.05.2020 05:23, Christopher Clark wrote:
> > +It is with this understanding as presented that the DomB project used as
> > the
> > +basis for the development of its multiple domain boot capability for Xen.
>
distro build system to pass additional args to the
python setup.py build and install commands.
Signed-off-by: Christopher Clark
---
Original patch from the Yocto/OpenEmbedded meta-virtualization layer.
Rewrapped and rebased onto the adjacent commit submitted in this series.
tools/pygrub/Makefile
Install pygrub with INSTALL_PYTHON_PROG, as per the other Xen python
executables, to ensure that the hashbang path to the interpreter
is written correctly in cross-compile builds, eg. with OpenEmbedded.
Signed-off-by: Christopher Clark
---
tools/pygrub/Makefile | 2 ++
1 file changed, 2
of downstream patching that has been
carried in the Yocto/OpenEmbedded meta-virtualization layer since 2012.
Signed-off-by: Christopher Clark
---
tools/configure| 48 ++
tools/configure.ac | 24 +++
2 files changed, 72 insertions
On Mon, Feb 10, 2020 at 8:21 AM Ian Jackson wrote:
>
> Christopher Clark writes ("[PATCH] tools/configure: generate stubs and
> long-double 32-bit headers if needed"):
> > The gnu/stubs-32.h and bits/long-double-32.h headers are required to
> > build hvmloader but
On Thu, Oct 29, 2020 at 12:58 PM Stefano Stabellini
wrote:
>
> On Thu, 29 Oct 2020, Jürgen Groß wrote:
> > On 29.10.20 01:37, Stefano Stabellini wrote:
> > > On Tue, 27 Oct 2020, Elliott Mitchell wrote:
> > > > On Mon, Oct 26, 2020 at 06:44:27PM +, Julien Grall wrote:
> > > > > On 26/10/2020 1
Simple test cases for the four Argo operations, register, unregister,
sendv and notify exercised with a single test domain.
Add infrastructure to access Argo: a 5-argument hypercall, number 39.
Signed-off-by: Christopher Clark
---
arch/x86/hypercall_page.S| 2 +-
arch/x86
Simple test cases for the four Argo operations, register, unregister,
sendv and notify exercised with a single test domain.
Add infrastructure to access Argo: a 5-argument hypercall, number 39.
Signed-off-by: Christopher Clark
---
v2:
- corrected the CC list. Apologies for the omissions in
# Session Notes on Xen system boot: launching VMs (DomB mode of dom0less)
Sessions Host: Christopher Clark. Scribing: Daniel Smith & Christopher Clark.
The DomB-mode-for-dom0less topic was covered in two design session slots
at the Xen Design & Developer Summit 2020.
## Session 1: Xe
On Wed, Jul 22, 2020 at 10:59 AM Srinivas Bangalore wrote:
> Dear Xen experts,
>
> Would greatly appreciate some hints on how to move forward with this one…
Hi Srini,
I don't have any strong recommendations for you, but I do want to say
that I'm very happy to see you taking this project on and I
On Tue, Jul 28, 2020 at 11:16 AM Stefano Stabellini
wrote:
>
> On Tue, 28 Jul 2020, André Przywara wrote:
> > On 28/07/2020 11:39, Alejandro wrote:
> > > Hello,
> > >
> > > El dom., 26 jul. 2020 a las 22:25, André Przywara
> > > () escribió:
> > >> So this was actually my first thought: The firmwa
On Wed, Jun 10, 2020 at 7:21 PM Roman Shaposhnik wrote:
>
> On Wed, Jun 10, 2020 at 11:54 AM Corey Minyard wrote:
> >
> > I had been working on Xen on the Pi4 by throwing kernels I compiled onto
> > existing sd cards, and this was working fine. I finally got to a full
> > yocto build of the syst
On Thu, Jun 11, 2020 at 12:12 PM Olaf Hering wrote:
>
> Am Wed, 10 Jun 2020 20:16:57 +0100
> schrieb Tim Deegan :
>
> > How tedious.
>
> Indeed. This compiles for me as well:
just a nudge on this; it would be nice to get a patch into the tree
since the build failure affects master builds of Xen i
;
> > > > On Mon, Jun 15, 2020 at 05:14:21PM -0700, Stefano Stabellini wrote:
> > > > > On Mon, 15 Jun 2020, Christopher Clark wrote:
> > > > > > On Wed, Jun 10, 2020 at 7:21 PM Roman Shaposhnik
> > > > > > w
On Tue, Jun 18, 2019 at 1:10 PM Nicholas Tsirakis
wrote:
>
> Some logging messages made more sense as argo debug
> logs rather than standard Xen logs. Use argo_dprintk
> to only print this info if argo DEBUG is enabled.
>
> Signed-off-by: Nicholas Tsirakis
Reviewed-by:
any of this code to
be included, making xen-guest.o conditional upon it here works correctly
and avoids further change to it in later patches in the series.
No functional change intended.
Signed-off-by: Christopher Clark
---
xen/arch/x86/guest/Makefile| 1 +
xen/arch/x86/guest/xen-guest.c
g of a Xen Blanket nested
system. Further work would be necessary for Linux upstreaming.)
Relevant other current Linux work is occurring here:
https://lkml.org/lkml/2019/4/8/67
https://lists.xenproject.org/archives/html/xen-devel/2019-05/msg00743.html
thanks,
Christopher
Christopher Clark
Expand XSM control to the full set of Xen version ops, to allow for
granular control over ops a domain is allowed to issue for the nested case.
Applies const to args of xsm_default_action.
Signed-off-by: Christopher Clark
---
tools/flask/policy/modules/dom0.te | 7 ++-
tools/flask
Provides proxying to the host hypervisor for the GNTTABOP_query_size op.
Signed-off-by: Christopher Clark
---
tools/flask/policy/modules/dom0.te | 1 +
xen/arch/x86/guest/hypercall_page.S | 1 +
xen/arch/x86/guest/xen-nested.c | 37 +
xen/arch/x86/hypercall.c
resources
that are normally operated by the control domain.
This nested hypercall only permits access from the control domain.
The XSM policy hook implementation is deferred to a subsequent commit.
Signed-off-by: Christopher Clark
---
xen/arch/x86/Kconfig | 22 +++
xen/arch
ommon PVH_GUEST and PV_SHIM logic for Xen as a Xen-aware guest".
Update calibrate_APIC_clock to use Xen-specific init if nested Xen is
detected, even if not operating as a PV shim or booted as PVH.
This work is a precursor to adding the interface for support of
PV drivers on nested Xen.
Signed
the nested case.
Signed-off-by: Christopher Clark
---
tools/flask/policy/modules/dom0.te| 3 +
xen/arch/x86/guest/hypercall_page.S | 1 +
xen/arch/x86/guest/xen-nested.c | 84 +++
xen/arch/x86/hypercall.c | 1 +
xen/arch/x86/pv/hypercall.c
Provides proxying to the host hypervisor for HVMOP_get_param and
HVMOP_set_param ops.
Signed-off-by: Christopher Clark
---
tools/flask/policy/modules/dom0.te | 1 +
xen/arch/x86/guest/hypercall_page.S | 1 +
xen/arch/x86/guest/xen-nested.c | 42 +
xen/arch/x86
Provides proxying to the host hypervisor for the XENMEM_add_to_physmap op
only for the XENMAPSPACE_shared_info and XENMAPSPACE_grant_table spaces,
for DOMID_SELF.
Both compat and native entry points.
Signed-off-by: Christopher Clark
---
tools/flask/policy/modules/dom0.te | 1 +
xen/arch/x86
Provides proxying to the host hypervisor for SCHEDOP_shutdown op.
Signed-off-by: Christopher Clark
---
tools/flask/policy/modules/dom0.te | 1 +
xen/arch/x86/guest/hypercall_page.S | 1 +
xen/arch/x86/guest/xen-nested.c | 25 +
xen/arch/x86/hypercall.c
On Thu, Jun 20, 2019 at 1:39 AM Paul Durrant wrote:
>
> > -Original Message-
> > From: Xen-devel On Behalf Of
> > Juergen Gross
> > Sent: 20 June 2019 05:18
> > To: Christopher Clark ;
> > xen-devel@lists.xenproject.org
> > Cc: Stefano Stab
201 - 300 of 384 matches
Mail list logo