|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] PVH: iopl
>>> On 20.09.12 at 00:13, Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> wrote:
> On Wed, 19 Sep 2012 12:29:07 -0700
> Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> wrote:
>
>>
>> I noticed anamoly in my code the way IOPL is set. For vcpu 0, its done
>> via
>>
>> set_iopl.iopl = 1;
>> rc = HYPERVISOR_physdev_op(PHYSDEVOP_set_iopl, &set_iopl);
>>
>> in xen_start_kernel() in enlighten.c. But, for non boot vcpus, its
>> done via eflags in cpu_initialize_context():
>> ctxt->user_regs.eflags = 0x1000; /* IOPL_RING1 */
>>
>> Since I am running in HVM container, IO ops cause vmexit. I can just
>> check eflags at that point for guest IOPL. So I am thinking of just
>> using eflags and not doing the hcall. It will also reduce the need
>> for another field in the struct pv_vcpu for me.
>>
>> (JFYI: EXIT_REASON_IO_INSTRUCTION cause emulate_privileged_op() to be
>> called).
>
> So, I got rid of calling hcall to set iopl. The guest just manages
> via eflags. Then upon vmexit:
>
> {
> int curr_lvl;
> int requested = (regs->rflags >> 12) & 3;
> read_vmcs_selectors(regs);
> curr_lvl = regs->cs & 3;
>
> if (requested >= curr_lvl && emulate_privileged_op(regs))
> return success;
>
> hvm_inject_hw_exception(TRAP_gp_fault, regs->error_code);
> }
>
> I tested it out, and seems fine.
And that's also how I would expect it to be. Even more - just like
the ring not needing to be 1, you shouldn't need to fiddle
artificially with IOPL. Just leave it at zero for the kernel, and
adjust between 0 and 3 for user mode based on the respective
syscalls).
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |