[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RESEND v1 6/7] x86: Implement Intel Processor Trace MSRs read/write
>>> On 03.05.18 at 11:40, <luwei.kang@xxxxxxxxx> wrote: > Thanks for your clarification. Please correct me if I have something > wrong. Guest may execute an instruction and this instruction may produce an > PT packet save in PT output buffer. An EPT violation will be generated if the > address of this PT buffer don't have EPT page table mapping, but this EPT > violations shouldn't be handled by x86_emulate() because it no relate with > the execute of this instruction. Plus - and that's very important - the EPT violation may be reported on some later insn. > In that case, can we build the EPT map when set the output buffer > address (IA32_RTIT_OUTPUT_BASE) and crash the guest if still happened EPT > violation with Intel PT output buffer read/write exit qualification. Or add > an exit qualification check before instruction emulation? Imo you should add an exit qualification check in any case. Depending what else you do, finding the new bit set may imply crashing the domain or doing something more sophisticated. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |