All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Roger Pau Monné" <roger.pau@citrix.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH v5 2/3] xen: add the RTC io space to the blocked access list
Date: Fri, 8 May 2015 13:55:19 +0200	[thread overview]
Message-ID: <554CA427.7050509@citrix.com> (raw)
In-Reply-To: <554CBF3B020000780007835D@mail.emea.novell.com>

El 08/05/15 a les 13.50, Jan Beulich ha escrit:
>>>> On 07.05.15 at 16:54, <roger.pau@citrix.com> wrote:
>> @@ -1548,6 +1549,8 @@ int __init construct_dom0(
>>          rc |= ioports_deny_access(d, pmtmr_ioport, pmtmr_ioport + 3);
>>      /* PCI configuration space (NB. 0xcf8 has special treatment). */
>>      rc |= ioports_deny_access(d, 0xcfc, 0xcff);
>> +    /* Never permit direct access to the RTC/CMOS registers. */
>> +    rc |= ioports_deny_access(d, RTC_PORT(0), RTC_PORT(1));
> 
> Looks like I prematurely committed this: Did you test that Dom0
> still can access CMOS/RTC with that change? I ask because the
> ioports_access_permitted() checks in guest_io_{read,write}()
> now ought to fail for Dom0... (Apart from that on second thought
> it looks wrong also conceptionally - we don't want to deny Dom0
> access to these ports, we just don't want it to access them
> directly.)

Yes, it looks like this needs to be reverted. I think we need to do
something similar to what I've done with 0xcf8; don't add the ports to
ioports_deny_access and just trap them for PVH in setup_io_bitmap.

Roger.

  reply	other threads:[~2015-05-08 11:55 UTC|newest]

Thread overview: 14+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-05-07 14:54 [PATCH v5 0/3] xen/pvh: use a custom IO bitmap for PVH hardware domains Roger Pau Monne
2015-05-07 14:54 ` [PATCH v5 1/3] " Roger Pau Monne
2015-05-07 15:10   ` Jan Beulich
2015-05-07 15:21     ` Roger Pau Monné
2015-05-18  6:05   ` Tian, Kevin
2015-05-07 14:54 ` [PATCH v5 2/3] xen: add the RTC io space to the blocked access list Roger Pau Monne
2015-05-07 15:15   ` Jan Beulich
2015-05-08 11:50   ` Jan Beulich
2015-05-08 11:55     ` Roger Pau Monné [this message]
2015-05-08 12:09       ` Jan Beulich
2015-05-07 14:54 ` [PATCH v5 3/3] xen: block access to IO port 0xcf9 Roger Pau Monne
2015-05-07 15:22   ` Jan Beulich
2015-05-07 15:57     ` Roger Pau Monné
2015-05-07 16:08       ` Jan Beulich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=554CA427.7050509@citrix.com \
    --to=roger.pau@citrix.com \
    --cc=JBeulich@suse.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.