From nobody Fri Mar 29 08:15:18 2024 Delivered-To: importer@patchew.org Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org ARC-Seal: i=1; a=rsa-sha256; t=1559649083; cv=none; d=zoho.com; s=zohoarc; b=Zu23ffPM5mq0gtb859IbkWeLT+fduI97PrH8S4Ulq+iv6ngOg5Uh7HVKQLEbN4XvzgN10JHccndKWvZ8PxEn85YBpxf86F+og8CSRqxWcdf0SHgWNNXRLzSDRuYQrEpgZESpTlgub+RWNe9pk1lw3a5rL8gHePIVPq7C9X90DBI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1559649083; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Sender:Subject:To:ARC-Authentication-Results; bh=/pXFjLmIFF8TjX4K/jmJrxf8ZtHNCDEJKKsCI/1MjEY=; b=JlxeDjibhUeiPdIlZg4/3fHnv7Nez2oUBZj7JiobTZJN+rLdoKTvBzyJ3vRqYtK9TE24UYw4QgQ/Qq7eFDK7Nr136ZJD4Pw8Frx81+GTFf59BSLAqKZYVp9dugWz9yfNr4oHiS2RQvGtbYRrnjPbPYXor1LvQSuZkuBTLymibBQ= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1559649083424539.4426141770971; Tue, 4 Jun 2019 04:51:23 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hY7x6-00051L-Jt; Tue, 04 Jun 2019 11:50:04 +0000 Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hY7x4-00051C-UR for xen-devel@lists.xenproject.org; Tue, 04 Jun 2019 11:50:03 +0000 Received: from EUR04-VI1-obe.outbound.protection.outlook.com (unknown [40.107.8.132]) by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS id e18b8e60-86be-11e9-8980-bc764e045a96; Tue, 04 Jun 2019 11:50:00 +0000 (UTC) Received: from VI1PR0202MB2928.eurprd02.prod.outlook.com (10.171.106.11) by VI1PR0202MB3549.eurprd02.prod.outlook.com (52.134.18.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1965.12; Tue, 4 Jun 2019 11:49:57 +0000 Received: from VI1PR0202MB2928.eurprd02.prod.outlook.com ([fe80::fdcf:4771:37b7:9830]) by VI1PR0202MB2928.eurprd02.prod.outlook.com ([fe80::fdcf:4771:37b7:9830%9]) with mapi id 15.20.1943.018; Tue, 4 Jun 2019 11:49:57 +0000 X-Inumbo-ID: e18b8e60-86be-11e9-8980-bc764e045a96 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bitdefender.onmicrosoft.com; s=selector1-bitdefender-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=BCX+WO5xcwiOXfl+EdbXTyd3haQStU/ghIaDygHvWJI=; b=xz2XJTDkFWKGfE4Ityv8ZBNY1w4zjY747p4weGMSjyAcq6Rhs3de5sKWVQhAv5EQwL92fZvjTVt4XPIKcyaahl99pJAa7Rr2FA6CObu8jEMGZIrr+dYFOBBRqAUzFdMYy6SANEdPd4S8/UlRGasTnGQWf/NNEj0GrP6HulBTOJY= From: Alexandru Stefan ISAILA To: "xen-devel@lists.xenproject.org" Thread-Topic: [PATCH v5] x86/emulate: Send vm_event from emulate Thread-Index: AQHVGsuhtcaVOzv43UiBDvbMIKzJ0g== Date: Tue, 4 Jun 2019 11:49:57 +0000 Message-ID: <20190604114943.4840-1-aisaila@bitdefender.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-clientproxiedby: VI1PR08CA0274.eurprd08.prod.outlook.com (2603:10a6:803:dc::47) To VI1PR0202MB2928.eurprd02.prod.outlook.com (2603:10a6:800:e3::11) authentication-results: spf=none (sender IP is ) smtp.mailfrom=aisaila@bitdefender.com; x-ms-exchange-messagesentrepresentingtype: 1 x-mailer: git-send-email 2.17.1 x-originating-ip: [91.199.104.6] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 9ba10de0-c826-48b6-37af-08d6e8e2c40f x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:VI1PR0202MB3549; x-ms-traffictypediagnostic: VI1PR0202MB3549:|VI1PR0202MB3549: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:294; x-forefront-prvs: 0058ABBBC7 x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(136003)(366004)(346002)(396003)(376002)(39860400002)(199004)(189003)(36756003)(66066001)(8676002)(305945005)(81166006)(81156014)(2351001)(6916009)(7736002)(6436002)(50226002)(2616005)(5640700003)(4326008)(6512007)(7416002)(107886003)(6486002)(53936002)(25786009)(8936002)(53946003)(476003)(1076003)(71190400001)(71200400001)(30864003)(5660300002)(73956011)(52116002)(66476007)(64756008)(486006)(2501003)(66556008)(66446008)(99286004)(316002)(386003)(6506007)(14444005)(256004)(102836004)(14454004)(2906002)(68736007)(26005)(54906003)(186003)(6116002)(3846002)(86362001)(478600001)(66946007)(309714004); DIR:OUT; SFP:1102; SCL:1; SRVR:VI1PR0202MB3549; H:VI1PR0202MB2928.eurprd02.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; Received-SPF: none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; received-spf: None (protection.outlook.com: bitdefender.com does not designate permitted sender hosts) x-ms-exchange-senderadcheck: 1 x-microsoft-antispam-message-info: gb9BlyIVnEiiBEMFrltabDxPvepUn5soTuTsGZJGd/vpX5dI3BQ+vFukyTorEGXEAMuabG15IeyeKif7Mp0uMp/tGVA9FF7ptj6lpb12nWzo1z7BeWehzf7ey1x5mqmW+7mLDCHrdKK2abMqKjqP3Y/k2hB5kWAY7yK3mVbwCkbyl5kiElXCwtnrmqpJ8yxrN7oUqXohg2J/z8uOXXSB6Km5zYecfmt/YWw7w/t+112OOSTRTqM0nI4/nsFVAgNGPHb4CagAWsejjtjWHU8et6ePY3OGlP6VwB+YhqQQJR3fjsAZLkoqqCZaKc6qGvfWQ9YFxGmJyv+SVc8tiV4q2fujrLgqechMlXsj+tQmI7wqmexR8C+Wn7pNjd0ogZG62CVmts2SLCXw45BRVFZtNHJMAietYsg3SPQSaYU7iGQ= MIME-Version: 1.0 X-OriginatorOrg: bitdefender.com X-MS-Exchange-CrossTenant-Network-Message-Id: 9ba10de0-c826-48b6-37af-08d6e8e2c40f X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jun 2019 11:49:57.1930 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 487baf29-f1da-469a-9221-243f830c36f3 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: aisaila@bbu.bitdefender.biz X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0202MB3549 Subject: [Xen-devel] [PATCH v5] x86/emulate: Send vm_event from emulate X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: "kevin.tian@intel.com" , "tamas@tklengyel.com" , "suravee.suthikulpanit@amd.com" , "wl@xen.org" , "jun.nakajima@intel.com" , "andrew.cooper3@citrix.com" , "rcojocaru@bitdefender.com" , "tim@xen.org" , "george.dunlap@eu.citrix.com" , "paul.durrant@citrix.com" , "jbeulich@suse.com" , Alexandru Stefan ISAILA , "boris.ostrovsky@oracle.com" , "brian.woods@amd.com" , "roger.pau@citrix.com" Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) This patch aims to have mem access vm events sent from the emulator. This is useful where we want to only emulate a page walk without checking the EPT, but we still want to check the EPT when emulating the instruction that caused the page walk. In this case, the original EPT fault is caused by the walk trying to set the accessed or dirty bits, but executing the instruction itself might also cause an EPT fault if permitted to run, and this second fault should not be lost. We use hvmemul_map_linear_addr() to intercept r/w access and __hvm_copy() to intercept exec access. First we try to send a vm event and if the event is sent then emulation returns X86EMUL_RETRY in order to stop emulation on instructions that use access protected pages. If the event is not sent then the emulation goes on as expected. Signed-off-by: Alexandru Isaila Reviewed-by: Paul Durrant --- Changes since V4: - Move the exec interception to __hvm_copy() - Remove the page-walk in hvm_emulate_send_vm_event() and get the needed address from the existing page walk - Add send_event param to __hvm_copy() and hvm_copy_from_guest_linear() - Drop X86EMUL_ACCESS_EXCEPTION and use X86EMUL_RETRY instead. --- xen/arch/x86/hvm/emulate.c | 71 +++++++++++++++++++++++++++++-- xen/arch/x86/hvm/hvm.c | 27 +++++++----- xen/arch/x86/hvm/svm/svm.c | 2 +- xen/arch/x86/hvm/vm_event.c | 2 +- xen/arch/x86/hvm/vmx/vvmx.c | 2 +- xen/arch/x86/mm/mem_access.c | 3 +- xen/arch/x86/mm/shadow/common.c | 4 +- xen/arch/x86/mm/shadow/hvm.c | 2 +- xen/include/asm-x86/hvm/emulate.h | 9 +++- xen/include/asm-x86/hvm/support.h | 2 +- 10 files changed, 101 insertions(+), 23 deletions(-) diff --git a/xen/arch/x86/hvm/emulate.c b/xen/arch/x86/hvm/emulate.c index 8659c89862..9b2d8c2014 100644 --- a/xen/arch/x86/hvm/emulate.c +++ b/xen/arch/x86/hvm/emulate.c @@ -12,9 +12,11 @@ #include #include #include +#include #include #include #include +#include #include #include #include @@ -530,6 +532,57 @@ static int hvmemul_do_mmio_addr(paddr_t mmio_gpa, return hvmemul_do_io_addr(1, mmio_gpa, reps, size, dir, df, ram_gpa); } =20 +bool hvm_emulate_send_vm_event(unsigned long gla, gfn_t gfn, + uint32_t pfec, bool send_event) +{ + xenmem_access_t access; + vm_event_request_t req =3D {}; + paddr_t gpa =3D ((gfn_x(gfn) << PAGE_SHIFT) | (gla & ~PAGE_MASK)); + + if ( !send_event || !pfec ) + return false; + + if ( p2m_get_mem_access(current->domain, gfn, &access, + altp2m_vcpu_idx(current)) !=3D 0 ) + return false; + + switch ( access ) { + case XENMEM_access_x: + case XENMEM_access_rx: + if ( pfec & PFEC_write_access ) + req.u.mem_access.flags =3D MEM_ACCESS_R | MEM_ACCESS_W; + break; + + case XENMEM_access_w: + case XENMEM_access_rw: + if ( pfec & PFEC_insn_fetch ) + req.u.mem_access.flags =3D MEM_ACCESS_X; + break; + + case XENMEM_access_r: + case XENMEM_access_n: + if ( pfec & PFEC_write_access ) + req.u.mem_access.flags |=3D MEM_ACCESS_R | MEM_ACCESS_W; + if ( pfec & PFEC_insn_fetch ) + req.u.mem_access.flags |=3D MEM_ACCESS_X; + break; + + default: + return false; + } + + if ( !req.u.mem_access.flags ) + return false; /* no violation */ + + req.reason =3D VM_EVENT_REASON_MEM_ACCESS; + req.u.mem_access.gfn =3D gfn_x(gfn); + req.u.mem_access.flags |=3D MEM_ACCESS_FAULT_WITH_GLA | MEM_ACCESS_GLA= _VALID; + req.u.mem_access.gla =3D gla; + req.u.mem_access.offset =3D gpa & ((1 << PAGE_SHIFT) - 1); + + return monitor_traps(current, true, &req) >=3D 0; +} + /* * Map the frame(s) covering an individual linear access, for writeable * access. May return NULL for MMIO, or ERR_PTR(~X86EMUL_*) for other err= ors @@ -547,6 +600,7 @@ static void *hvmemul_map_linear_addr( unsigned int nr_frames =3D ((linear + bytes - !!bytes) >> PAGE_SHIFT) - (linear >> PAGE_SHIFT) + 1; unsigned int i; + gfn_t gfn; =20 /* * mfn points to the next free slot. All used slots have a page refer= ence @@ -585,7 +639,7 @@ static void *hvmemul_map_linear_addr( ASSERT(mfn_x(*mfn) =3D=3D 0); =20 res =3D hvm_translate_get_page(curr, addr, true, pfec, - &pfinfo, &page, NULL, &p2mt); + &pfinfo, &page, &gfn, &p2mt); =20 switch ( res ) { @@ -615,6 +669,13 @@ static void *hvmemul_map_linear_addr( =20 if ( pfec & PFEC_write_access ) { + if ( hvm_emulate_send_vm_event(addr, gfn, pfec, + hvmemul_ctxt->send_event) ) + { + err =3D ERR_PTR(~X86EMUL_RETRY); + goto out; + } + if ( p2m_is_discard_write(p2mt) ) { err =3D ERR_PTR(~X86EMUL_OKAY); @@ -1115,7 +1176,8 @@ static int linear_read(unsigned long addr, unsigned i= nt bytes, void *p_data, * clean up any interim state. */ if ( !hvmemul_find_mmio_cache(vio, addr, IOREQ_READ, false) ) - rc =3D hvm_copy_from_guest_linear(p_data, addr, bytes, pfec, &pfin= fo); + rc =3D hvm_copy_from_guest_linear(p_data, addr, bytes, pfec, &pfin= fo, + hvmemul_ctxt->send_event); =20 switch ( rc ) { @@ -2509,12 +2571,13 @@ int hvm_emulate_one_mmio(unsigned long mfn, unsigne= d long gla) } =20 void hvm_emulate_one_vm_event(enum emul_kind kind, unsigned int trapnr, - unsigned int errcode) + unsigned int errcode, bool send_event) { struct hvm_emulate_ctxt ctx =3D {{ 0 }}; int rc; =20 hvm_emulate_init_once(&ctx, NULL, guest_cpu_user_regs()); + ctx.send_event =3D send_event; =20 switch ( kind ) { @@ -2629,7 +2692,7 @@ void hvm_emulate_init_per_insn( hvm_copy_from_guest_linear(hvmemul_ctxt->insn_buf, addr, sizeof(hvmemul_ctxt->insn_buf), pfec | PFEC_insn_fetch, - NULL) =3D=3D HVMTRANS_okay) ? + NULL, false) =3D=3D HVMTRANS_okay)= ? sizeof(hvmemul_ctxt->insn_buf) : 0; } else diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 029eea3b85..f6df57b442 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -2942,7 +2942,7 @@ void hvm_task_switch( } =20 rc =3D hvm_copy_from_guest_linear( - &tss, prev_tr.base, sizeof(tss), PFEC_page_present, &pfinfo); + &tss, prev_tr.base, sizeof(tss), PFEC_page_present, &pfinfo, false= ); if ( rc =3D=3D HVMTRANS_bad_linear_to_gfn ) hvm_inject_page_fault(pfinfo.ec, pfinfo.linear); if ( rc !=3D HVMTRANS_okay ) @@ -2989,7 +2989,7 @@ void hvm_task_switch( goto out; =20 rc =3D hvm_copy_from_guest_linear( - &tss, tr.base, sizeof(tss), PFEC_page_present, &pfinfo); + &tss, tr.base, sizeof(tss), PFEC_page_present, &pfinfo, false); if ( rc =3D=3D HVMTRANS_bad_linear_to_gfn ) hvm_inject_page_fault(pfinfo.ec, pfinfo.linear); /* @@ -3180,7 +3180,7 @@ enum hvm_translation_result hvm_translate_get_page( #define HVMCOPY_linear (1u<<2) static enum hvm_translation_result __hvm_copy( void *buf, paddr_t addr, int size, struct vcpu *v, unsigned int flags, - uint32_t pfec, pagefault_info_t *pfinfo) + uint32_t pfec, pagefault_info_t *pfinfo, bool send_event) { gfn_t gfn; struct page_info *page; @@ -3224,6 +3224,12 @@ static enum hvm_translation_result __hvm_copy( return HVMTRANS_bad_gfn_to_mfn; } =20 + if ( hvm_emulate_send_vm_event(addr, gfn, pfec, send_event) ) + { + put_page(page); + return HVMTRANS_gfn_paged_out; + } + p =3D (char *)__map_domain_page(page) + (addr & ~PAGE_MASK); =20 if ( flags & HVMCOPY_to_guest ) @@ -3267,14 +3273,14 @@ enum hvm_translation_result hvm_copy_to_guest_phys( paddr_t paddr, void *buf, int size, struct vcpu *v) { return __hvm_copy(buf, paddr, size, v, - HVMCOPY_to_guest | HVMCOPY_phys, 0, NULL); + HVMCOPY_to_guest | HVMCOPY_phys, 0, NULL, false); } =20 enum hvm_translation_result hvm_copy_from_guest_phys( void *buf, paddr_t paddr, int size) { return __hvm_copy(buf, paddr, size, current, - HVMCOPY_from_guest | HVMCOPY_phys, 0, NULL); + HVMCOPY_from_guest | HVMCOPY_phys, 0, NULL, false); } =20 enum hvm_translation_result hvm_copy_to_guest_linear( @@ -3283,16 +3289,17 @@ enum hvm_translation_result hvm_copy_to_guest_linea= r( { return __hvm_copy(buf, addr, size, current, HVMCOPY_to_guest | HVMCOPY_linear, - PFEC_page_present | PFEC_write_access | pfec, pfinfo= ); + PFEC_page_present | PFEC_write_access | pfec, pfinfo, + false); } =20 enum hvm_translation_result hvm_copy_from_guest_linear( void *buf, unsigned long addr, int size, uint32_t pfec, - pagefault_info_t *pfinfo) + pagefault_info_t *pfinfo, bool send_event) { return __hvm_copy(buf, addr, size, current, HVMCOPY_from_guest | HVMCOPY_linear, - PFEC_page_present | pfec, pfinfo); + PFEC_page_present | pfec, pfinfo, send_event); } =20 unsigned long copy_to_user_hvm(void *to, const void *from, unsigned int le= n) @@ -3333,7 +3340,7 @@ unsigned long copy_from_user_hvm(void *to, const void= *from, unsigned len) return 0; } =20 - rc =3D hvm_copy_from_guest_linear(to, (unsigned long)from, len, 0, NUL= L); + rc =3D hvm_copy_from_guest_linear(to, (unsigned long)from, len, 0, NUL= L, false); return rc ? len : 0; /* fake a copy_from_user() return code */ } =20 @@ -3707,7 +3714,7 @@ void hvm_ud_intercept(struct cpu_user_regs *regs) sizeof(sig), hvm_access_insn_fetch, cs, &addr) && (hvm_copy_from_guest_linear(sig, addr, sizeof(sig), - walk, NULL) =3D=3D HVMTRANS_okay)= && + walk, NULL, false) =3D=3D HVMTRAN= S_okay) && (memcmp(sig, "\xf\xbxen", sizeof(sig)) =3D=3D 0) ) { regs->rip +=3D sizeof(sig); diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c index cd6a6b382b..d0d1d7e0a7 100644 --- a/xen/arch/x86/hvm/svm/svm.c +++ b/xen/arch/x86/hvm/svm/svm.c @@ -1255,7 +1255,7 @@ static void svm_emul_swint_injection(struct x86_event= *event) goto raise_exception; =20 rc =3D hvm_copy_from_guest_linear(&idte, idte_linear_addr, idte_size, - PFEC_implicit, &pfinfo); + PFEC_implicit, &pfinfo, false); if ( rc ) { if ( rc =3D=3D HVMTRANS_bad_linear_to_gfn ) diff --git a/xen/arch/x86/hvm/vm_event.c b/xen/arch/x86/hvm/vm_event.c index 121de23071..6d203e8db5 100644 --- a/xen/arch/x86/hvm/vm_event.c +++ b/xen/arch/x86/hvm/vm_event.c @@ -87,7 +87,7 @@ void hvm_vm_event_do_resume(struct vcpu *v) kind =3D EMUL_KIND_SET_CONTEXT_INSN; =20 hvm_emulate_one_vm_event(kind, TRAP_invalid_op, - X86_EVENT_NO_EC); + X86_EVENT_NO_EC, false); =20 v->arch.vm_event->emulate_flags =3D 0; } diff --git a/xen/arch/x86/hvm/vmx/vvmx.c b/xen/arch/x86/hvm/vmx/vvmx.c index 7bca572d88..04be8b98b6 100644 --- a/xen/arch/x86/hvm/vmx/vvmx.c +++ b/xen/arch/x86/hvm/vmx/vvmx.c @@ -426,7 +426,7 @@ static int decode_vmx_inst(struct cpu_user_regs *regs, { pagefault_info_t pfinfo; int rc =3D hvm_copy_from_guest_linear(poperandS, base, size, - 0, &pfinfo); + 0, &pfinfo, false); =20 if ( rc =3D=3D HVMTRANS_bad_linear_to_gfn ) hvm_inject_page_fault(pfinfo.ec, pfinfo.linear); diff --git a/xen/arch/x86/mm/mem_access.c b/xen/arch/x86/mm/mem_access.c index 0144f92b98..c9972bab8c 100644 --- a/xen/arch/x86/mm/mem_access.c +++ b/xen/arch/x86/mm/mem_access.c @@ -214,7 +214,8 @@ bool p2m_mem_access_check(paddr_t gpa, unsigned long gl= a, d->arch.monitor.inguest_pagefault_disabled && npfec.kind !=3D npfec_kind_with_gla ) /* don't send a mem_event */ { - hvm_emulate_one_vm_event(EMUL_KIND_NORMAL, TRAP_invalid_op, X86_EV= ENT_NO_EC); + hvm_emulate_one_vm_event(EMUL_KIND_NORMAL, TRAP_invalid_op, + X86_EVENT_NO_EC, true); =20 return true; } diff --git a/xen/arch/x86/mm/shadow/common.c b/xen/arch/x86/mm/shadow/commo= n.c index 795201dc82..2bb80accf0 100644 --- a/xen/arch/x86/mm/shadow/common.c +++ b/xen/arch/x86/mm/shadow/common.c @@ -166,7 +166,7 @@ const struct x86_emulate_ops *shadow_init_emulation( hvm_access_insn_fetch, sh_ctxt, &addr) && !hvm_copy_from_guest_linear( sh_ctxt->insn_buf, addr, sizeof(sh_ctxt->insn_buf), - PFEC_insn_fetch, NULL)) + PFEC_insn_fetch, NULL, false)) ? sizeof(sh_ctxt->insn_buf) : 0; =20 return &hvm_shadow_emulator_ops; @@ -201,7 +201,7 @@ void shadow_continue_emulation(struct sh_emulate_ctxt *= sh_ctxt, hvm_access_insn_fetch, sh_ctxt, &addr) && !hvm_copy_from_guest_linear( sh_ctxt->insn_buf, addr, sizeof(sh_ctxt->insn_buf), - PFEC_insn_fetch, NULL)) + PFEC_insn_fetch, NULL, false)) ? sizeof(sh_ctxt->insn_buf) : 0; sh_ctxt->insn_buf_eip =3D regs->rip; } diff --git a/xen/arch/x86/mm/shadow/hvm.c b/xen/arch/x86/mm/shadow/hvm.c index c6469c846c..3841d0ceb7 100644 --- a/xen/arch/x86/mm/shadow/hvm.c +++ b/xen/arch/x86/mm/shadow/hvm.c @@ -125,7 +125,7 @@ hvm_read(enum x86_segment seg, rc =3D hvm_copy_from_guest_linear(p_data, addr, bytes, (access_type =3D=3D hvm_access_insn_fe= tch ? PFEC_insn_fetch : 0), - &pfinfo); + &pfinfo, false); =20 switch ( rc ) { diff --git a/xen/include/asm-x86/hvm/emulate.h b/xen/include/asm-x86/hvm/em= ulate.h index b39a1a0331..9bed0aa83e 100644 --- a/xen/include/asm-x86/hvm/emulate.h +++ b/xen/include/asm-x86/hvm/emulate.h @@ -47,6 +47,7 @@ struct hvm_emulate_ctxt { uint32_t intr_shadow; =20 bool_t set_context; + bool send_event; }; =20 enum emul_kind { @@ -63,7 +64,8 @@ int hvm_emulate_one( struct hvm_emulate_ctxt *hvmemul_ctxt); void hvm_emulate_one_vm_event(enum emul_kind kind, unsigned int trapnr, - unsigned int errcode); + unsigned int errcode, + bool send_event); /* Must be called once to set up hvmemul state. */ void hvm_emulate_init_once( struct hvm_emulate_ctxt *hvmemul_ctxt, @@ -80,6 +82,11 @@ struct segment_register *hvmemul_get_seg_reg( enum x86_segment seg, struct hvm_emulate_ctxt *hvmemul_ctxt); int hvm_emulate_one_mmio(unsigned long mfn, unsigned long gla); +bool hvm_emulate_send_vm_event( + unsigned long gla, + gfn_t gfn, + uint32_t pfec, + bool send_event); =20 static inline bool handle_mmio(void) { diff --git a/xen/include/asm-x86/hvm/support.h b/xen/include/asm-x86/hvm/su= pport.h index e989aa7349..914f388921 100644 --- a/xen/include/asm-x86/hvm/support.h +++ b/xen/include/asm-x86/hvm/support.h @@ -99,7 +99,7 @@ enum hvm_translation_result hvm_copy_to_guest_linear( pagefault_info_t *pfinfo); enum hvm_translation_result hvm_copy_from_guest_linear( void *buf, unsigned long addr, int size, uint32_t pfec, - pagefault_info_t *pfinfo); + pagefault_info_t *pfinfo, bool send_event); =20 /* * Get a reference on the page under an HVM physical or linear address. If --=20 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel