[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Xen Introspection, KPTI, and CR3 bit 63 leads to guest VMENTRY failures during introspection
This also impacts the "on change only" control setting code. This should not count as a changed CR3 value for reporting purposes.From some debugging code: hvm_event_cr, value: 800000001aad0000, old: 1aad0000 --- xenserver-4.7.1-clean/xen/arch/x86/hvm/event.c 2017-05-10 11:29:14.135332964 -0600 +++ xenserver-4.7.1/xen/arch/x86/hvm/event.c 2018-01-25 16:52:05.938251000 -0700 @@ -33,6 +33,11 @@ struct arch_domain *ad = &curr->domain->arch; unsigned int ctrlreg_bitmask = monitor_ctrlreg_bitmask(index); + + // Patch in work from Razvan + if ( hvm_pcid_enabled(curr) ) + value &= ((1ull << 63) - 1); + if ( (ad->monitor.write_ctrlreg_enabled & ctrlreg_bitmask) && (!(ad->monitor.write_ctrlreg_onchangeonly & ctrlreg_bitmask) || value != old) ) On Thu, Jan 25, 2018 at 4:03 PM, Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> wrote: On 01/26/2018 12:17 AM, Bitweasil . wrote: _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |