>>> On 30.05.18 at 15:28, <luwei.k...@intel.com> wrote:
> Using EPT to translate PT output addresses introduces the possibility of
> taking events on PT output reads and writes. Event possibilities include
> EPT violations, EPT misconfigurations, PML log-full VM exits, and APIC
> access VM exits.
> EPT violations:
>  a. Intel PT buffer is a MMIO address in guest. Actually, it can be a
>     MMIO address (SDM 35.2.6.1), but in order do not affect other
>     passthrough/emulate device in guest. Ferbid use MMIO addr at present.
>  b. Intel PT buffer is a RAM non-writable address. Don't need emulate
>     and inject a #GP to guest.

Is such #GP injection architectural behavior? We've got a few bad
examples where we inject exceptions which are architecturally
impossible - let's please not add any further instances.

> @@ -4027,6 +4028,10 @@ void vmx_vmexit_handler(struct cpu_user_regs *regs)
>          break;
>  
>      case EXIT_REASON_APIC_ACCESS:
> +        __vmread(EXIT_QUALIFICATION, &exit_qualification);
> +        if ( exit_qualification & 0x10000 )

Please no use of literal numbers like this.

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to