[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH]Remove EPT guest linear address validation


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: "Jiang, Yunhong" <yunhong.jiang@xxxxxxxxx>
  • Date: Mon, 20 Dec 2010 22:51:54 +0800
  • Accept-language: en-US
  • Acceptlanguage: en-US
  • Delivery-date: Mon, 20 Dec 2010 06:52:37 -0800
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: AcugVXEP2EEQ+1tsQ6qFVPjBoJfMPg==
  • Thread-topic: [PATCH]Remove EPT guest linear address validation

Remove EPT guest linear address validation

For EPT violation resulting from an attempt to load the guest PDPTEs as part of 
the execution of the MOV CR instruction, the EPT_GLA_VALID is not valid.
This situation should not happen in most situation, since we always populate 
guest memory. But this is not ture for PAE guest under the PoD/Page sharing 
situation. In that situation, a page pointed by CR3 may be un-populated, and we 
need handle it in such situation.

Signed-off-by: Jiang, Yunhong <yunhong.jiang@xxxxxxxxx>

diff -r ff1b80ccecd9 xen/arch/x86/hvm/vmx/vmx.c
--- a/xen/arch/x86/hvm/vmx/vmx.c        Fri Dec 17 16:12:37 2010 +0000
+++ b/xen/arch/x86/hvm/vmx/vmx.c        Mon Dec 20 18:52:16 2010 +0800
@@ -2079,8 +2079,7 @@ static void ept_handle_violation(unsigne
         __trace_var(TRC_HVM_NPF, 0, sizeof(_d), &_d);
     }

-    if ( (qualification & EPT_GLA_VALID) &&
-         hvm_hap_nested_page_fault(gfn) )
+    if ( hvm_hap_nested_page_fault(gfn) )
         return;

     /* Everything else is an error. */

Attachment: remove_ept_linear_address_validation.patch
Description: remove_ept_linear_address_validation.patch

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.