|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2] VMX: don't allow PVH to reach handle_mmio()
PVH guests accessing I/O ports via string ops is not supported yet.
Reported-by: Roger Pau MonnÃ<roger.pau@xxxxxxxxxx>
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
---
v2: handle_pio() is already safe (pointed out by Mukesh), so only refuse
entering handle_mmio().
Note: Only compile tested so far.
--- unstable.orig/xen/arch/x86/hvm/vmx/vmx.c 2014-11-27 09:37:27.000000000
+0100
+++ unstable/xen/arch/x86/hvm/vmx/vmx.c 2014-12-08 10:04:27.000000000 +0100
@@ -3086,7 +3086,8 @@ void vmx_vmexit_handler(struct cpu_user_
if ( exit_qualification & 0x10 )
{
/* INS, OUTS */
- if ( !handle_mmio() )
+ if ( unlikely(is_pvh_vcpu(v)) /* PVH fixme */ ||
+ !handle_mmio() )
hvm_inject_hw_exception(TRAP_gp_fault, 0);
}
else
Attachment:
VMX-PVH-no-emulated-IO-string-ops.patch _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |