Displaying 20 results from an estimated 36 matches for "ioio".
Did you mean:
iio
2020 Jun 03
2
[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions
On Wed, Jun 03, 2020 at 04:23:25PM +0200, Joerg Roedel wrote:
> > > + */
> > > + io_bytes = (exit_info_1 >> 4) & 0x7;
> > > + ghcb_count = sizeof(ghcb->shared_buffer) / io_bytes;
> > > +
> > > + op_count = (exit_info_1 & IOIO_REP) ? regs->cx : 1;
> > > + exit_info_2 = min(op_count, ghcb_count);
> > > + exit_bytes = exit_info_2 * io_bytes;
> > > +
> > > + es_base = insn_get_seg_base(ctxt->regs, INAT_SEG_REG_ES);
> > > +
> > > + if (!(exit_info_1 & IOIO_...
2020 Jun 03
2
[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions
On Wed, Jun 03, 2020 at 04:23:25PM +0200, Joerg Roedel wrote:
> > > + */
> > > + io_bytes = (exit_info_1 >> 4) & 0x7;
> > > + ghcb_count = sizeof(ghcb->shared_buffer) / io_bytes;
> > > +
> > > + op_count = (exit_info_1 & IOIO_REP) ? regs->cx : 1;
> > > + exit_info_2 = min(op_count, ghcb_count);
> > > + exit_bytes = exit_info_2 * io_bytes;
> > > +
> > > + es_base = insn_get_seg_base(ctxt->regs, INAT_SEG_REG_ES);
> > > +
> > > + if (!(exit_info_1 & IOIO_...
2020 Feb 11
1
[PATCH 19/62] x86/sev-es: Add support for handling IOIO exceptions
On Tue, Feb 11, 2020 at 5:53 AM Joerg Roedel <joro at 8bytes.org> wrote:
>
> From: Tom Lendacky <thomas.lendacky at amd.com>
>
> Add support for decoding and handling #VC exceptions for IOIO events.
>
> Signed-off-by: Tom Lendacky <thomas.lendacky at amd.com>
> [ jroedel at suse.de: Adapted code to #VC handling framework ]
> Co-developed-by: Joerg Roedel <jroedel at suse.de>
> Signed-off-by: Joerg Roedel <jroedel at suse.de>
It would be nice if this co...
2020 Jun 03
0
[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions
...is emulated.
>
> Doesn't this also suppress single-step #DBs?
Yes it does.
>
> > + */
> > + io_bytes = (exit_info_1 >> 4) & 0x7;
> > + ghcb_count = sizeof(ghcb->shared_buffer) / io_bytes;
> > +
> > + op_count = (exit_info_1 & IOIO_REP) ? regs->cx : 1;
> > + exit_info_2 = min(op_count, ghcb_count);
> > + exit_bytes = exit_info_2 * io_bytes;
> > +
> > + es_base = insn_get_seg_base(ctxt->regs, INAT_SEG_REG_ES);
> > +
> > + if (!(exit_info_1 & IOIO_TYPE_IN)) {
> > + ret...
2020 Jun 04
0
[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions
On Wed, Jun 03, 2020 at 04:07:16PM -0700, Sean Christopherson wrote:
> On Wed, Jun 03, 2020 at 04:23:25PM +0200, Joerg Roedel wrote:
> > User-space can also cause IOIO #VC exceptions, and user-space can be
> > 32-bit legacy code with segments, so es_base has to be taken into
> > account.
>
> Is there actually a use case for this? Exposing port IO to userspace
> doesn't exactly improve security.
Might be true, but Linux supports it and...
2020 Jun 04
1
[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions
On Thu, Jun 04, 2020 at 12:15:02PM +0200, Joerg Roedel wrote:
> On Wed, Jun 03, 2020 at 04:07:16PM -0700, Sean Christopherson wrote:
> > On Wed, Jun 03, 2020 at 04:23:25PM +0200, Joerg Roedel wrote:
> > > User-space can also cause IOIO #VC exceptions, and user-space can be
> > > 32-bit legacy code with segments, so es_base has to be taken into
> > > account.
> >
> > Is there actually a use case for this? Exposing port IO to userspace
> > doesn't exactly improve security.
>
> Might...
2006 May 16
0
[PATCH][SVM][1/5] cleanup IOIO handling
SVM patch to cleanup IOIO handling, do not use "real" mode but rather
the correct "bitness".
Applies cleanly to 10002.
Please apply to xen-unstable.hg.
Please apply to xen-3.0-testing.hg.
Signed-off-by: Tom Woller <thomas.woller@amd.com>
Signed-off-by: Mats Petersson <mats.petersson@amd.com>...
2020 May 20
2
[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions
On Tue, Apr 28, 2020 at 05:16:35PM +0200, Joerg Roedel wrote:
> From: Tom Lendacky <thomas.lendacky at amd.com>
>
> Add support for decoding and handling #VC exceptions for IOIO events.
>
> Signed-off-by: Tom Lendacky <thomas.lendacky at amd.com>
> [ jroedel at suse.de: Adapted code to #VC handling framework ]
> Co-developed-by: Joerg Roedel <jroedel at suse.de>
> Signed-off-by: Joerg Roedel <jroedel at suse.de>
> ---
> arch/x86/boo...
2020 May 20
2
[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions
On Tue, Apr 28, 2020 at 05:16:35PM +0200, Joerg Roedel wrote:
> From: Tom Lendacky <thomas.lendacky at amd.com>
>
> Add support for decoding and handling #VC exceptions for IOIO events.
>
> Signed-off-by: Tom Lendacky <thomas.lendacky at amd.com>
> [ jroedel at suse.de: Adapted code to #VC handling framework ]
> Co-developed-by: Joerg Roedel <jroedel at suse.de>
> Signed-off-by: Joerg Roedel <jroedel at suse.de>
> ---
> arch/x86/boo...
2020 May 16
1
[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions
Just a reminder so that this doesn't get lost:
On Tue, Apr 28, 2020 at 05:16:35PM +0200, Joerg Roedel wrote:
> + if (exit_info_1 & IOIO_TYPE_STR) {
> + int df = (regs->flags & X86_EFLAGS_DF) ? -1 : 1;
...
> +
> + if (!(exit_info_1 & IOIO_TYPE_IN)) {
> + ret = vc_insn_string_read(ctxt,
> + (void *)(es_base + regs->si),
> + ghcb->shared_buffer, io_bytes,
> +...
2020 Feb 11
0
[PATCH 19/62] x86/sev-es: Add support for handling IOIO exceptions
From: Tom Lendacky <thomas.lendacky at amd.com>
Add support for decoding and handling #VC exceptions for IOIO events.
Signed-off-by: Tom Lendacky <thomas.lendacky at amd.com>
[ jroedel at suse.de: Adapted code to #VC handling framework ]
Co-developed-by: Joerg Roedel <jroedel at suse.de>
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
arch/x86/boot/compressed/sev-es.c | 3 +
arch...
2020 Apr 28
0
[PATCH v3 25/75] x86/sev-es: Add support for handling IOIO exceptions
From: Tom Lendacky <thomas.lendacky at amd.com>
Add support for decoding and handling #VC exceptions for IOIO events.
Signed-off-by: Tom Lendacky <thomas.lendacky at amd.com>
[ jroedel at suse.de: Adapted code to #VC handling framework ]
Co-developed-by: Joerg Roedel <jroedel at suse.de>
Signed-off-by: Joerg Roedel <jroedel at suse.de>
---
arch/x86/boot/compressed/sev-es.c | 32 +++++...
2020 Feb 13
2
[PATCH 41/62] x86/sev-es: Handle MSR events
On 2/11/20 5:52 AM, Joerg Roedel wrote:
> Implement a handler for #VC exceptions caused by RDMSR/WRMSR
> instructions.
As a general comment on all of these event handlers: Why do we bother
having the hypercalls in the interrupt handler as opposed to just
calling them directly. What you have is:
wrmsr()
-> #VC exception
hcall()
But we could make our rd/wrmsr() wrappers just do:
2020 Feb 13
2
[PATCH 41/62] x86/sev-es: Handle MSR events
On 2/11/20 5:52 AM, Joerg Roedel wrote:
> Implement a handler for #VC exceptions caused by RDMSR/WRMSR
> instructions.
As a general comment on all of these event handlers: Why do we bother
having the hypercalls in the interrupt handler as opposed to just
calling them directly. What you have is:
wrmsr()
-> #VC exception
hcall()
But we could make our rd/wrmsr() wrappers just do:
2020 Feb 14
1
[PATCH 41/62] x86/sev-es: Handle MSR events
...basically the first thing after
> setting up a stack is calling verify_cpu(), which uses CPUID.
Ahh, bummer. How does a guest know that it's running under SEV-ES?
What's the enumeration mechanism if CPUID doesn't "work"?
> The other reason is that things like MMIO and IOIO instructions can't be
> easily patched by alternatives. Those would work with the runtime
> checking you showed above, though.
Is there a reason we can't make a rule that you *must* do MMIO through
an accessor function so we *can* patch them? I know random drivers
might break the ru...
2006 Dec 05
3
Question regarding VM_EXIT and VGA
Hi
I am working on a project using WINDOWS guest on XEN archticture. I
have a couple of questions.
As I understand when a VM exit occurs due to I/O like say a mouse
interrupt -- the XEN hypervisor gets a notification and it forwards
the I/O request to the qemu-dm in Domain-0 via an event channel. Now
during this VM exit , is the guest OS blocked ?
Specifically, what about VGA writes are they
2020 Jul 15
5
[PATCH v4 00/75] x86: SEV-ES Guest Support
...use the only thing I remember is that #VC could happen on any memop,
> but I also have vague memories of that being a later extention.
Currently it is only raised when something happens that the hypervisor
intercepts, for example on a couple of instructions like CPUID,
RD/WRMSR, ..., or on MMIO/IOIO accesses.
With Secure Nested Paging (SNP), which needs additional enablement, a #VC can
happen on any memory access. I wrote the IST handling entry code for #VC
with that in mind, but do not actually enable it. This is the reason why
the #VC handler just panics the system when it ends up on the fa...
2020 Jul 15
5
[PATCH v4 00/75] x86: SEV-ES Guest Support
...use the only thing I remember is that #VC could happen on any memop,
> but I also have vague memories of that being a later extention.
Currently it is only raised when something happens that the hypervisor
intercepts, for example on a couple of instructions like CPUID,
RD/WRMSR, ..., or on MMIO/IOIO accesses.
With Secure Nested Paging (SNP), which needs additional enablement, a #VC can
happen on any memory access. I wrote the IST handling entry code for #VC
with that in mind, but do not actually enable it. This is the reason why
the #VC handler just panics the system when it ends up on the fa...
2001 Dec 22
6
Need Help --- Sambaserver is not accessible
Sambaserver is not accessible
I have a problem connecting to SAMBA from Windows/ME systems
(using samba--2.2.2 on Red hat Linux 7.1)
What I would like to know is - What can I change to get this to work properly?
SETUP
I have a simple network -
three Windows/ME systems and 1 Red Hat Linux 7.1 system all on the same
subnet.
There is a linksys router on the same subnet that
provides WAN
2007 Apr 13
18
A different probklem with save/restore on C/S 14823.
I''m not seeing the problem that Fan Zhao is reporting, instead I get
this one. Not sure if ti''s the same one or a different problem... This
happens with my simple-guest [i.e. not using hvmloader, as I described
before]. This worked fine yesterday.
(XEN) event_channel.c:178:d0 EVTCHNOP failure: domain 0, error -22, line
178
(XEN) bad shared page: 0
(XEN) domain_crash_sync called