|
|
|
|
|
|
|
|
|
|
xen-devel
RE: [Xen-devel] [PATCH]: Add handlers for missing exit_reasons documente
Yes, sounds better with a warn_on. Thanks for helping me add it : )
Yuan
-----Original Message-----
From: Keir Fraser [mailto:keir.fraser@xxxxxxxxxxxxx]
Sent: Friday, September 03, 2010 4:40 PM
To: Liu, Yuan B; xen-devel@xxxxxxxxxxxxxxxxxxx
Cc: Dong, Eddie; Zhang, Xiantao
Subject: Re: [Xen-devel] [PATCH]: Add handlers for missing exit_reasons
documented by Intel SDM 3B
On 03/09/2010 09:29, "Liu, Yuan B" <yuan.b.liu@xxxxxxxxx> wrote:
> According to the SDM, GETSEC, INVEPT, INVVPID can be executed by guests in
> some cases. For e.g.
>
> GETSEC(SDM 2B 6.2.1)
> System software enables SMX operation by setting CR4.SMXE[Bit 14] = 1 before
> attempting to execute GETSEC. Otherwise, execution of GETSEC results in the
> processor signaling an invalid opcode exception (#UD).
>
> Since Xen doesn't permit guests to set the SMXE bit in CR4 (refer to
> hvm_set_cr4 in hvm.c) GETSEC should generate an #UD instead of referring to
> default handler.
Well actually given that CR4.SMXE always is 0 when the guest runs, the
VMEXIT will never be taken, since the CPU checks CR4.SMXE before checking
for running in non-root context.
I guess I agree with the patch overall. I would consider putting a
WARN_ON(1) on the GETSEC vmexit path, with a code comment explaining it
should be unreachable currently. What do you think? I can make that change
myself if you agree.
-- Keir
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
|
|
|
|