[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v3] x86/mm: Add mem access rights to NPT



>>> On 19.07.18 at 10:43, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
> On 07/19/2018 11:30 AM, Jan Beulich wrote:
>>>>> On 19.07.18 at 10:18, <aisaila@xxxxxxxxxxxxxxx> wrote:
>>> On Mi, 2018-07-18 at 15:33 +0000, George Dunlap wrote:
>>>>> On Jul 2, 2018, at 8:42 AM, Alexandru Isaila <aisaila@bitdefender.c 
>>>>> +            break;
>>>>> +        case p2m_access_x:
>>>>> +            flags &= ~_PAGE_RW;
>>>>> +            break;
>>>>> +        case p2m_access_rwx:
>>>>> +        default:
>>>>> +            break;
>>>>>     }
>>>> I think you want another blank line here too.
>>>>
>>>> Also, this doesn’t seem to capture the ‘r’ part of the equation —
>>>> shouldn’t p2m_access_n end up with a not-present p2m entry?
>>>
>>> SVM dosen't explicitly provide a read access bit so we treat read and
>>> write the same way.
>> 
>> Read and write can't possibly be treated the same. You ought to use
>> the present bit to deny read (really: any) access, as also implied by
>> George's response.
> 
> They aren't treated the same as far sending out a vm_event goes.
> However, if we understand this correctly, there is no way to cause only
> read, or only write exits for NPT. They are bundled together under _PAGE_RW.
> 
> So svm_do_nested_pgfault() tries to sort these out:
> 
> 1781     struct npfec npfec = {
> 1782         .read_access = !(pfec & PFEC_insn_fetch),
> 1783         .write_access = !!(pfec & PFEC_write_access),
> 1784         .insn_fetch = !!(pfec & PFEC_insn_fetch),
> 1785         .present = !!(pfec & PFEC_page_present),
> 1786     };
> 1787
> 1788     /* These bits are mutually exclusive */
> 1789     if ( pfec & NPT_PFEC_with_gla )
> 1790         npfec.kind = npfec_kind_with_gla;
> 1791     else if ( pfec & NPT_PFEC_in_gpt )
> 1792         npfec.kind = npfec_kind_in_gpt;
> 1793
> 1794     ret = hvm_hap_nested_page_fault(gpa, ~0ul, npfec);
> 
> but a read access is considered to be something that's not an insn
> fetch, and we only have a specific bit set for the write.
> 
> Since hvm_hap_nested_page_fault() looks at npfec to decide when to send
> out a vm_event, this takes care of handling reads and writes differently
> at this level; however it's not possible to set separate single "don't
> read" or "don't write" exit-causing flags with NPT.

All fine, but George's question was raised in the context of permission
conversion from p2m to pte representation.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.