Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754142AbcC3GkH (ORCPT ); Wed, 30 Mar 2016 02:40:07 -0400 Received: from mga01.intel.com ([192.55.52.88]:56439 "EHLO mga01.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752305AbcC3GkF (ORCPT ); Wed, 30 Mar 2016 02:40:05 -0400 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.24,414,1455004800"; d="scan'208";a="677823823" Subject: Re: [PATCH 1/4] KVM: MMU: fix permission_fault() To: Paolo Bonzini References: <1458911978-19430-1-git-send-email-guangrong.xiao@linux.intel.com> <56F54983.4010508@redhat.com> <56FABECE.40601@linux.intel.com> <56FAE0F3.9090809@redhat.com> <56FB3254.5070403@linux.intel.com> <56FB73E0.7060601@redhat.com> Cc: gleb@kernel.org, mtosatti@redhat.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, "Han, Huaitong" From: Xiao Guangrong Message-ID: <56FB7489.2080304@linux.intel.com> Date: Wed, 30 Mar 2016 14:39:05 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.5.1 MIME-Version: 1.0 In-Reply-To: <56FB73E0.7060601@redhat.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 738 Lines: 23 On 03/30/2016 02:36 PM, Paolo Bonzini wrote: > > > On 30/03/2016 03:56, Xiao Guangrong wrote: >>> x86/access.flat is currently using the "other" definition, i.e., PFEC.PK >>> is only set if W=1 or CR0.WP=0 && PFEC.U=0 or PFEC.W=0. Can you use it >>> (with ept=1 of course) to check what the processor is doing? >> >> Sure. >> >> And ept=1 is hard to trigger MMU issue, i am enabling PKEY on shadow >> MMU, let's see what will happen. ;) > > No, don't do that! > > ept=1 lets you test what the processor does. It means you cannot test > permission_fault(), but what we want here is just reverse engineering > the microcode. ept=1 lets you do exactly that. Yes, i got this point. Huaitong will do the test once the machine gets free.