[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH RFC] xen/pvh: use a custom IO bitmap for PVH hardware domains



El 08/04/15 a les 14.57, Roger Pau Monne ha escrit:
> Since a PVH hardware domain has access to the physical hardware create a
> custom more permissive IO bitmap. The permissions set on the bitmap are
> populated based on the contents of the ioports rangeset.
> 
> Also add the IO ports of the serial console used by Xen to the list of not
> accessible IO ports.

I have one question about the current IO port handling for PVH guests
(DomU and Dom0). There's some code right now in vmx_vmexit_handler
(EXIT_REASON_IO_INSTRUCTION) that's kind PVH specific:

if ( exit_qualification & 0x10 )
{
    /* INS, OUTS */
    if ( unlikely(is_pvh_vcpu(v)) /* PVH fixme */ ||
         !handle_mmio() )
        hvm_inject_hw_exception(TRAP_gp_fault, 0);
}
else
{
    /* IN, OUT */
    uint16_t port = (exit_qualification >> 16) & 0xFFFF;
    int bytes = (exit_qualification & 0x07) + 1;
    int dir = (exit_qualification & 0x08) ? IOREQ_READ : IOREQ_WRITE;

    if ( handle_pio(port, bytes, dir) )
        update_guest_eip(); /* Safe: IN, OUT */
}

Is there any need for DomUs to access the IO ports? I know that FreeBSD
will poke at some of them during boot to scan for devices, but I'm not
sure if we could just make them noops in the PVH case and simply return
garbage.

Also, once this is set the PVH Specification document should be updated
to reflect what can guests expect when poking at IO ports.

Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.