[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v4] x86: detect CMOS aliasing on ports other than 0x70/0x71


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Tue, 21 Mar 2023 15:12:07 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=HCnVkib/T414/cDllS1/34kDxVQyBuWOgh7LngwejbU=; b=MyH+2vriW2092tPoXVGOr58uXzDyRSHVvT/mGNRUUDl0Jbz+nlk516fjPfmN664VyzTsDD5klbzeZbijSGQiKa9voYYW95CCiG5gXPjO6tNfc78K/46HQykFYnMJfCWLIPsClmg/EtgpAGRCzsXm8xrdPmnHD34L1eHWfWe1UkAsCCJ6cwM3xtIjcjYljGDe+yNn2G5dDfHhKbBsfV9v1rAcJzK9fz4dpJExqd61yflvteQhMoosd1mwWcfiNvM9mo+YOHY+ps8DdCTk6N/06VqSoURmkq0LbkOq1aSpTMnV7BQywsIbM+XkZGwbj2b8/YhMOw8ekgNdGyIz1LZDHg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lrAvjMBqxx5jAZ/6Xhxvx1fhJjaIopv1HM4Gz1q2D07kys9ci0wW/78bxubCZzTmuQLVBT4IufU/KN0sImPG3hNOc5jkMKzOEe9MAqu8ZHw6yyKSkNMwULLMAos80WhqOmUXIVlW92dBzmlpWKYRHZvyFpmKU1PmhPwZvHdkjvui4EEEQH/xXdy/eDX9hKhQu8mb0Oc4tvyhPjoyu6ivLfPpe5JXHrhf8jdG+oLEGtZUugGRFWnkqGWVs6ZQ4sHOCQ8ZgySsTMYGQSCfgnNsewSgF8tRw9Ow0WQKg2EbQ4i4YoZzeNkh8fGTsnG/QwMRljxLX74SRWL0YEljHWs/gg==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Paul Durrant <paul@xxxxxxx>, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Tue, 21 Mar 2023 14:12:38 +0000
  • Ironport-data: A9a23:7mwt/6PxB4DCZ+fvrR2RlsFynXyQoLVcMsEvi/4bfWQNrUon1jwHz WYaWm6DbqrYYjemKt0nbt+3oE5SuZGDndQyTAto+SlhQUwRpJueD7x1DKtS0wC6dZSfER09v 63yTvGacajYm1eF/k/F3oDJ9CU6jufQAOKnUoYoAwgpLSd8UiAtlBl/rOAwh49skLCRDhiE/ Nj/uKUzAnf8s9JPGj9SuvLrRC9H5qyo42tD5AVmP5ingXeF/5UrJMNHTU2OByOQrrl8RoaSW +vFxbelyWLVlz9F5gSNy+uTnuUiG9Y+DCDW4pZkc/HKbitq/0Te5p0TJvsEAXq7vh3S9zxHJ HehgrTrIeshFvWkdO3wyHC0GQkmVUFN0OevzXRSLaV/ZqAJGpfh66wGMa04AWEX0r4sPztu1 Pg9FBVXQjubl/qY2J+QYMA506zPLOGzVG8ekldJ6GiDSNwAEdXESaiM4sJE1jAtgMwIBezZe 8cSdTtoalLHfgFLPVAUTpk5mY9EhFGmK2Ee9A3T+PdxujaDpOBy+OGF3N79YNuFSN8Thk+Fj mnH4374ElcRM9n3JT+tqyr13rCew3uqMG4UPLGU8NM62VSa+mwwCzQuCET8jMKrrGfrDrqzL GRRoELCt5Ma9kamU938VB2Qu2Ofs1gXXN84O/037kSBx7TZ5y6dB3MYVXhRZdo+rsg0SDc2k FiTkLvBHTVytJWFRHTb8a2bxRutPQAFIGlEYjULJTbp+PHmqYA3yxjJHtBqFffvisWvQG+gh TeXsCI5mrMfy9YR0Lm29kzGhDTqoYXVSgky5UPcWWfNAh5FWbNJrreAsTDzhcus5q7DJrVdl BDoQ/Sj0d0=
  • Ironport-hdrordr: A9a23:j/TUHqx56qmyJiYbJo2mKrPwKL1zdoMgy1knxilNoEpuA6ilfq GV/MjzuiWetN98YhsdcLO7WZVoI0myyXcv2/h1AV7KZmCPhILPFuxfBODZrQEIdReTygbzv5 0QFJSXpLfLfDtHZWeR2njbL+od
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Mon, Mar 20, 2023 at 09:32:26AM +0100, Jan Beulich wrote:
> ... in order to also intercept Dom0 accesses through the alias ports.

I'm trying to get some documentation about this aliasing, but so far I
haven't been able to find any.  Do you have any references of where I
might be able to find it?

> Also stop intercepting accesses to the CMOS ports if we won't ourselves
> use the CMOS RTC.

Could this create any concerns with the ability to disable NMIs if we
no longer filter accesses to the RTC?

Thanks, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.