Displaying 20 results from an estimated 6000 matches similar to: "Regarding Xen security...."
2007 Mar 22
1
DomU configuration file
Hi,
I know this may be very basic question but I need some help . Actually I
installed VM using the Xen Administrative console.
Now I need to change the configuration file as I need to passthrough
(using the pci-hide) a SCSI contoller from Dom0 to DomU.
But I couldnot find the configuration file.
Where can I find the Configuration file for this DomU?
Actually I added the
2006 Sep 22
1
[RFC][PATCH][UPDATED] Intel(R) LaGrande Technology support
This patch adds SMP support to the previous version. Since that has not
been merged I have included it in this patch. This should apply cleanly
to the tip. Below is the text of the original submittal, slightly
updated.
Attached is a preliminary patch that adds Intel(R) LaGrande Technology
(LT) (Safer Mode Extensions - SMX) support to Xen. While there are
still several enhancements needed for
2007 Apr 12
4
Re: [Xense-devel] [RFC][PATCH][UPDATED] Intel(R) LaGrande Technology support
Hello,
Has any more work been done on this front? The message below is
from Sept. 2006. In particular, the LT/TXT Technology Enabling
Platform (TEP) is now available from MPC Corp. Where can one
obtain an appropriate AC SINIT module (i.e., like
lpg_sinit_20050831_pae.auth.bin below)? I would like to begin
using Xen with TXT support.
Thanks,
-Jon
This patch adds SMP support to the
2007 Apr 24
3
could netcard be hotpluged in a running VM?
hi
I have try to "xm block-attach " to hotplug a disk into a running paraVM
and I want to kown whether the netcard could be hotpluged into a
running paraVM?
if it could , how to do it?
could you holp me
Thanks in advance
_______________________________________________
Xen-users mailing list
Xen-users@lists.xensource.com
http://lists.xensource.com/xen-users
2003 Oct 19
23
Notification
************* eManager Notification **************
Recipient, Content filter has detected a sensitive e-mail.
Destination mailbox(es): "samba@samba.org"
******************* End of message *******************
-------------- next part --------------
Received: from 208.8.92.167 by jupiter.INSIDEAI.COM (InterScan E-Mail VirusWall NT); Sun, 19 Oct 2003 14:55:27 -0400
Received: from
2010 Aug 18
4
RE: [PATCH 05/15] Nested Virtualization: core
> +
> +/* The exitcode is in native SVM/VMX format. The forced exitcode
> + * is in generic format.
> + */
Introducing a 3rd format of exitcode is over-complicated IMO.
> +enum nestedhvm_vmexits
> +nestedhvm_vcpu_vmexit(struct vcpu *v, struct cpu_user_regs *regs,
> + uint64_t exitcode)
> +{
I doubt about the necessary of this kind of wrapper.
In single layer
2012 Dec 10
26
[PATCH 00/11] Add virtual EPT support Xen.
From: Zhang Xiantao <xiantao.zhang@intel.com>
With virtual EPT support, L1 hyerpvisor can use EPT hardware
for L2 guest''s memory virtualization. In this way, L2 guest''s
performance can be improved sharply. According to our testing,
some benchmarks can show > 5x performance gain.
Signed-off-by: Zhang Xiantao <xiantao.zhang@intel.com>
Zhang Xiantao (11):
2007 Aug 27
3
[PATCH] Limit MCG Cap
Intercept guest reads of MSR_IA32_MCG_CAP and limit the number of memory banks reported to one.
This prevents us from trying to read status of non-existent banks when migrated to a machine
with fewer banks.
Signed-off-by: Ben Guthro
Signed-off-by: David Lively <dlively@virtualiron.com>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
2013 Sep 23
11
[PATCH v4 0/4] x86/HVM: miscellaneous improvements
The first and third patches are cleaned up versions of an earlier v3
submission by Yang.
1: Nested VMX: check VMX capability before read VMX related MSRs
2: VMX: clean up capability checks
3: Nested VMX: fix IA32_VMX_CR4_FIXED1 msr emulation
4: x86: make hvm_cpuid() tolerate NULL pointers
Signed-off-by: Jan Beulich <jbeulich@suse.com>
2012 May 24
11
[PATCH 0/3] XEN: fix vmx exception mistake
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP), INTn instruction emulation.
Introduce new function vmx_inject_sw_exception() which deliver the software
excetion, software interrupt and privileged software exception. Split hardware
exception as a seperate function(old function vmx_inject_hw_exception()).
Also Passed down intruction length
2020 Jul 21
87
[PATCH v9 00/84] VM introspection
The KVM introspection subsystem provides a facility for applications
running on the host or in a separate VM, to control the execution of
other VMs (pause, resume, shutdown), query the state of the vCPUs (GPRs,
MSRs etc.), alter the page access bits in the shadow page tables (only
for the hardware backed ones, eg. Intel's EPT) and receive notifications
when events of interest have taken place
2012 May 30
12
[PATCH v2 0/4] XEN: fix vmx exception mistake
Changes from v1:
- Define new struct hvm_trap to represent information of trap, include
instruction length.
- Renames hvm_inject_exception to hvm_inject_trap. Then define a couple of
wrappers around that function for existing callers, so that their parameter
lists actually *shrink*.
This series of patches fix the mistake for debug exception(#DB), overflow
exception(#OF) and INT3(#BP),
2013 Jul 10
2
[PATCH] x86/HVM: key handler registration functions can be __init
This applies to both SVM and VMX.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/xen/arch/x86/hvm/svm/vmcb.c
+++ b/xen/arch/x86/hvm/svm/vmcb.c
@@ -310,7 +310,7 @@ static struct keyhandler vmcb_dump_keyha
.desc = "dump AMD-V VMCBs"
};
-void setup_vmcb_dump(void)
+void __init setup_vmcb_dump(void)
{
register_keyhandler(''v'',
2020 Feb 07
78
[RFC PATCH v7 00/78] VM introspection
The KVM introspection subsystem provides a facility for applications
running on the host or in a separate VM, to control the execution of
other VMs (pause, resume, shutdown), query the state of the vCPUs (GPRs,
MSRs etc.), alter the page access bits in the shadow page tables (only
for the hardware backed ones, eg. Intel's EPT) and receive notifications
when events of interest have taken place
2007 Feb 26
4
[PATCH][xentrace][HVM] introduce HVM tracing to unify SVM and VMX tracing
Hello,
this patch introduces HVM tracing: one tracing class for both, SVM and
VMX.
It adds several new trace events. So we can differentiate between them
in the xentrace formats file and format each event''s data items
appropriately. With this patch the xentrace_format output is much more
informative.
The previous simple tracing in SVM and VMX is completely replaced.
Unfortunately I
2008 Jan 11
3
HP Proliant DL145g3, xen-3.1.0 and SVM
I''ve got a DL145g3 which is reporting svm support in /proc/cpuinfo:
processor : 0
vendor_id : AuthenticAMD
cpu family : 15
model : 65
model name : Dual-Core AMD Opteron(tm) Processor 2214 HE
stepping : 2
cpu MHz : 2200.000
cache size : 1024 KB
physical id : 0
siblings : 2
core id : 0
cpu cores : 2
fpu
2006 Nov 29
25
EFER in HVM guests
Is it intentional that
- under SVM, 32-bit guests can freely set EFER.LME
- under VMX, 32-bit guests can''t access EFER at all?
Thanks, Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2008 Mar 06
4
FW: oprofile 0.9.3 xen symbols incorrect
Hi
I am using oprofile 0.9.3 on xen cs 16540 on an Intel system.
When I look at the top "hot" functions, I see p2m_change_type being one
of the top function in xen-syms. This function is only in the svm (AMD)
code and should not appear on an Intel system. I see that this function
is not being clled at all when I am running my apps as I have put printk
in the functions and they do
2010 Sep 25
2
xm mem-set for HVM Domain
HI,
I have an ubuntu 10.04 with xen kernel 2.6.32.11 as Dom0. xm mem-set
does not seem to have any effect on the HVM domains.
Xen Version : 4.0.1
HVM : Ubuntu 10.04
I have allocated 512MB to dom0 and 2048MB to HVM.
$xm list
Name ID Mem VCPUs State
Time(s)
Domain-0 0 512 1 r-----
358.8
lucid_hvm
2020 Jul 22
34
[RFC PATCH v1 00/34] VM introspection - EPT Views and Virtualization Exceptions
This patch series is based on the VM introspection patches
(https://lore.kernel.org/kvm/20200721210922.7646-1-alazar at bitdefender.com/),
extending the introspection API with EPT Views and Virtualization
Exceptions (#VE) support.
The purpose of this series is to get an initial feedback and to see if
we are on the right track, especially because the changes made to add
the EPT views are not small