Re: [Xen-devel] [PATCH] xen/p2m: Remove np2m-specific filter from generic p2m_flush_table

2017-01-30 Thread Matt Leinhos
ing in p2m_flush_nestedp2m(). >> >> NB that this is not a security issue: The only time this codepath is >> called is in cases where either nestedp2m or altp2m is enabled, and >> neither of them are in security support. >> >> Reported-by: Matt Leinhos <m...@starlab.i

[Xen-devel] altp2m: unexpected behavior

2017-01-27 Thread Matt Leinhos
was expecting that by destroying the view in step 3, all the MFNs in that view would revert back to XENMEM_access_default. However, after completing step 4, I still encounter #VEs based on the permissions I set in step 2. Is this a deliberate design decision? Thanks, Matt -- Matt Leinhos Star

Re: [Xen-devel] [BUG] altp2m from domU crashes the host

2016-11-02 Thread Matt Leinhos
Andrew, Thank you for the tip. The crash does not happen when the "maxmem" option in the config file is disabled. I still get funny behavior with my driver, but I need to investigate that further. Regards, Matt On 11/02/2016 08:23 AM, Andrew Cooper wrote: > On 02/11/16 13:16, Matt

[Xen-devel] [BUG] altp2m from domU crashes the host

2016-11-02 Thread Matt Leinhos
happens immediately. I've also seen a delayed host crash with Xen 4.6, but I'm focusing on the 4.8 RC here. I don't know exactly which step causes the crash. I'll continue my investigation today. I'll work on a sample driver to exercise the crash if that's helpful. Regards, Matt Leinhos Star Lab

[Xen-devel] Followup: HVMOP_altp2m_vcpu_enable_notify code example usage

2016-10-26 Thread Matt Leinhos
in the xen code or through searches. I am attempting to use the altp2m API from a domU and need to handle #VE. Thank you, Matt Leinhos Star Lab, San Antonio, TX ___ Xen-devel mailing list Xen-devel@lists.xen.org https://lists.xen.org/xen-devel