[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3] x86/mm: Add mem access rights to NPT
>>> On 19.07.18 at 10:43, <rcojocaru@xxxxxxxxxxxxxxx> wrote: > On 07/19/2018 11:30 AM, Jan Beulich wrote: >>>>> On 19.07.18 at 10:18, <aisaila@xxxxxxxxxxxxxxx> wrote: >>> On Mi, 2018-07-18 at 15:33 +0000, George Dunlap wrote: >>>>> On Jul 2, 2018, at 8:42 AM, Alexandru Isaila <aisaila@bitdefender.c >>>>> + break; >>>>> + case p2m_access_x: >>>>> + flags &= ~_PAGE_RW; >>>>> + break; >>>>> + case p2m_access_rwx: >>>>> + default: >>>>> + break; >>>>> } >>>> I think you want another blank line here too. >>>> >>>> Also, this doesn’t seem to capture the ‘r’ part of the equation — >>>> shouldn’t p2m_access_n end up with a not-present p2m entry? >>> >>> SVM dosen't explicitly provide a read access bit so we treat read and >>> write the same way. >> >> Read and write can't possibly be treated the same. You ought to use >> the present bit to deny read (really: any) access, as also implied by >> George's response. > > They aren't treated the same as far sending out a vm_event goes. > However, if we understand this correctly, there is no way to cause only > read, or only write exits for NPT. They are bundled together under _PAGE_RW. > > So svm_do_nested_pgfault() tries to sort these out: > > 1781 struct npfec npfec = { > 1782 .read_access = !(pfec & PFEC_insn_fetch), > 1783 .write_access = !!(pfec & PFEC_write_access), > 1784 .insn_fetch = !!(pfec & PFEC_insn_fetch), > 1785 .present = !!(pfec & PFEC_page_present), > 1786 }; > 1787 > 1788 /* These bits are mutually exclusive */ > 1789 if ( pfec & NPT_PFEC_with_gla ) > 1790 npfec.kind = npfec_kind_with_gla; > 1791 else if ( pfec & NPT_PFEC_in_gpt ) > 1792 npfec.kind = npfec_kind_in_gpt; > 1793 > 1794 ret = hvm_hap_nested_page_fault(gpa, ~0ul, npfec); > > but a read access is considered to be something that's not an insn > fetch, and we only have a specific bit set for the write. > > Since hvm_hap_nested_page_fault() looks at npfec to decide when to send > out a vm_event, this takes care of handling reads and writes differently > at this level; however it's not possible to set separate single "don't > read" or "don't write" exit-causing flags with NPT. All fine, but George's question was raised in the context of permission conversion from p2m to pte representation. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |