From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [PATCH 08/13] KVM: SVM: Add intercept checks for SVM instructions Date: Mon, 28 Mar 2011 14:08:21 +0200 Message-ID: <4D907A35.9090008@redhat.com> References: <1301309210-11120-1-git-send-email-joerg.roedel@amd.com> <1301309210-11120-9-git-send-email-joerg.roedel@amd.com> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: Marcelo Tosatti , kvm@vger.kernel.org To: Joerg Roedel Return-path: Received: from mx1.redhat.com ([209.132.183.28]:8093 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751755Ab1C1MIZ (ORCPT ); Mon, 28 Mar 2011 08:08:25 -0400 In-Reply-To: <1301309210-11120-9-git-send-email-joerg.roedel@amd.com> Sender: kvm-owner@vger.kernel.org List-ID: On 03/28/2011 12:46 PM, Joerg Roedel wrote: > This patch adds the necessary code changes in the > instruction emulator and the extensions to svm.c to > implement intercept checks for the svm instructions. > > diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c > index 485a09f..9b22f5f 100644 > --- a/arch/x86/kvm/svm.c > +++ b/arch/x86/kvm/svm.c > @@ -3896,6 +3896,14 @@ static struct __x86_intercept { > [x86_intercept_sidt] = POST_MEM(SVM_EXIT_IDTR_READ), > [x86_intercept_lgdt] = POST_MEM(SVM_EXIT_GDTR_WRITE), > [x86_intercept_lidt] = POST_MEM(SVM_EXIT_IDTR_WRITE), > + [x86_intercept_vmrun] = POST_EX(SVM_EXIT_VMRUN), > + [x86_intercept_vmmcall] = POST_EX(SVM_EXIT_VMMCALL), VMMCALL is not privileged, is it? > + [x86_intercept_vmload] = POST_EX(SVM_EXIT_VMLOAD), > + [x86_intercept_vmsave] = POST_EX(SVM_EXIT_VMSAVE), > + [x86_intercept_stgi] = POST_EX(SVM_EXIT_STGI), > + [x86_intercept_clgi] = POST_EX(SVM_EXIT_CLGI), > + [x86_intercept_skinit] = POST_EX(SVM_EXIT_SKINIT), > + [x86_intercept_invlpga] = POST_EX(SVM_EXIT_INVLPGA), > }; > -- error compiling committee.c: too many arguments to function