|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] privileged op emulation
I'm new to this list, so please forgive me if this has already been
discussed or I'm way off target.
I am interested in how the XEN hypervisor handles privileged ops,
specifically on x86 platforms.
Looking at emulate_privileged_op(), called from do_general_protection()
[xen/arch/x86/traps.c], I think there is a problem with how instructions
are emulated. Assuming all permission checks pass, the instruction is
emulated. But it is emulated with XEN hypervisor context. I believe it
needs to be emulated with the user's context in place. I'm not saying
XEN gets the wrong answer for the specific instruction (I'm worried
about "out"), I'm saying that this instruction might have side effects,
and therefore the user's context needs to be restored in registers
before this instruction is executed. I believe XEN needs to validate
the op, then restore the users context, run the instruction, and iret to
the user, without modifying any registers in between the instruction and
the iret.
Thanks,
dave
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] privileged op emulation,
Altobelli, David <=
|
|
|
|
|