[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [Xen-devel] [PATCH]: Add handlers for missing exit_reasons documented by Intel SDM 3B
According to the SDM, GETSEC, INVEPT, INVVPID can be executed by guests in some cases. For e.g. GETSEC(SDM 2B 6.2.1) System software enables SMX operation by setting CR4.SMXE[Bit 14] = 1 before attempting to execute GETSEC. Otherwise, execution of GETSEC results in the processor signaling an invalid opcode exception (#UD). Since Xen doesn't permit guests to set the SMXE bit in CR4 (refer to hvm_set_cr4 in hvm.c) GETSEC should generate an #UD instead of referring to default handler. Simply put, for these three reasons, crashing the guest is considered to overkill and #UD is better. For ACCESS_GDTR_OR_IDTR, ACCESS_LDTR_OR_TR , vm-exiting is not expected and is considered to be hardware fault, so they go to default handler path. Xen doesn't implement logic to take this VMX_PREEMPTION_TIMER_EXPIRED feature. So it shouldn't happen in a sound hardware configuration. Patches just make this more explicit. Thanks, Yuan -----Original Message----- From: Keir Fraser [mailto:keir.fraser@xxxxxxxxxxxxx] Sent: Friday, September 03, 2010 3:15 PM To: Liu, Yuan B; xen-devel@xxxxxxxxxxxxxxxxxxx Cc: Dong, Eddie Subject: Re: [Xen-devel] [PATCH]: Add handlers for missing exit_reasons documented by Intel SDM 3B Is this just for neatness (we never actually should be vmexit'ing for these reasons)? If so, isn't it really better to keep these handled by the default case which logs the vmexit as an unexpected error? -- Keir On 03/09/2010 07:11, "Liu, Yuan B" <yuan.b.liu@xxxxxxxxx> wrote: > These are just two trivial patches. > > xen/arch/x86/hvm/vmx/vmx.c | 14 ++++++++++++++ > xen/include/asm-x86/hvm/vmx/vmx.h | 6 ++++++ > 2 files changed, 20 insertions(+), 0 deletions(-) > > Thanks, > Yuan > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |