On 02/09/2010 04:14 PM, Gleb Natapov wrote:
Make emulator check that vcpu is allowed to execute IN, INS, OUT,
OUTS, CLI, STI.
+bool kvm_check_iopl(struct kvm_vcpu *vcpu)
+{
+ int iopl;
+ if (!is_protmode(vcpu))
+ return false;
+ if (kvm_get_rflags(vcpu)& X86_EFLAGS_VM)
+ return true;
+ iopl = (kvm_get_rflags(vcpu)& X86_EFLAGS_IOPL)>> IOPL_SHIFT;
+ return kvm_x86_ops->get_cpl(vcpu)> iopl;
+}
Confusingly named - check doesn't imply what the return value means
(and 'true' is surprising for a failure). Suggest kvm_bad_iopl() or
similar.
+
+bool kvm_check_io_port_access_allowed(struct kvm_vcpu *vcpu, u16 port, u16 len)
+{
Similarly, can drop check_ from the name.
+ struct kvm_segment tr_seg;
+ int r;
+ u16 io_bitmap_ptr;
+ u8 perm, bit_idx = port& 0x7;
+ unsigned mask = (1<< len) - 1;
+
+ kvm_get_segment(vcpu,&tr_seg, VCPU_SREG_TR);
+ if (tr_seg.unusable)
+ return false;
+ if (tr_seg.limit< 103)
+ return false;
+ r = kvm_read_guest_virt_system(tr_seg.base + 102,&io_bitmap_ptr, 2,
+ vcpu, NULL);
+ if (r != X86EMUL_CONTINUE)
+ return false;
+ if (io_bitmap_ptr + port/8>= tr_seg.limit)
+ return false;
Should this be '>'? limits are generally inclusive of the byte read
(i.e. they aren't the size of the segment, but the offset of the last byte).
+ r = kvm_read_guest_virt_system(tr_seg.base + io_bitmap_ptr + port/8,
+ &perm, 1, vcpu, NULL);
+ if (r != X86EMUL_CONTINUE)
+ return false;
+ if ((perm>> bit_idx)& mask)
+ return false;
+ return true;
+}
+
--
error compiling committee.c: too many arguments to function
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html