[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH RESEND v1 6/7] x86: Implement Intel Processor Trace MSRs read/write



>>> On 03.05.18 at 11:40, <luwei.kang@xxxxxxxxx> wrote:
>      Thanks for your clarification. Please correct me if I have something 
> wrong. Guest may execute an instruction and this instruction may produce an 
> PT packet save in PT output buffer. An EPT violation will be generated if the 
> address of this PT buffer don't have EPT page table mapping, but this EPT 
> violations shouldn't be handled by x86_emulate() because it no relate with 
> the execute of this instruction.

Plus - and that's very important - the EPT violation may be reported on some
later insn.

>      In that case, can we build the EPT map when set the output buffer 
> address (IA32_RTIT_OUTPUT_BASE) and crash the guest if still happened EPT 
> violation with Intel PT output buffer read/write exit qualification. Or add 
> an exit qualification check before instruction emulation?

Imo you should add an exit qualification check in any case. Depending
what else you do, finding the new bit set may imply crashing the domain
or doing something more sophisticated.

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.