int hvm_hap_nested_page_fault(unsigned long gpa,
bool_t gla_valid,
unsigned long gla,
- bool_t access_valid,
bool_t access_r,
bool_t access_w,
bool_t access_x)
mfn = get_gfn_type_access(p2m, gfn, &p2mt, &p2ma, p2m_guest, NULL);
/* Check access permissions first, then handle faults */
- if ( access_valid && (mfn_x(mfn) != INVALID_MFN) )
+ if ( mfn_x(mfn) != INVALID_MFN )
{
int violation = 0;
/* If the access is against the permissions, then send to mem_event */
}
static void svm_do_nested_pgfault(struct vcpu *v,
- struct cpu_user_regs *regs, paddr_t gpa)
+ struct cpu_user_regs *regs, uint32_t npfec, paddr_t gpa)
{
int ret;
unsigned long gfn = gpa >> PAGE_SHIFT;
p2m_access_t p2ma;
struct p2m_domain *p2m = NULL;
- ret = hvm_hap_nested_page_fault(gpa, 0, ~0ul, 0, 0, 0, 0);
+ ret = hvm_hap_nested_page_fault(gpa, 0, ~0ul,
+ 1, /* All NPFs count as reads */
+ npfec & PFEC_write_access,
+ npfec & PFEC_insn_fetch);
if ( tb_init_done )
{
case -1:
ASSERT(nestedhvm_enabled(v->domain) && nestedhvm_vcpu_in_guestmode(v));
/* inject #VMEXIT(NPF) into guest. */
- nestedsvm_vmexit_defer(v, VMEXIT_NPF, regs->error_code, gpa);
+ nestedsvm_vmexit_defer(v, VMEXIT_NPF, npfec, gpa);
return;
}
case VMEXIT_NPF:
perfc_incra(svmexits, VMEXIT_NPF_PERFC);
- regs->error_code = vmcb->exitinfo1;
if ( cpu_has_svm_decode )
v->arch.hvm_svm.cached_insn_len = vmcb->guest_ins_len & 0xf;
- svm_do_nested_pgfault(v, regs, vmcb->exitinfo2);
+ svm_do_nested_pgfault(v, regs, vmcb->exitinfo1, vmcb->exitinfo2);
v->arch.hvm_svm.cached_insn_len = 0;
break;
qualification & EPT_GLA_VALID ? 1 : 0,
qualification & EPT_GLA_VALID
? __vmread(GUEST_LINEAR_ADDRESS) : ~0ull,
- 1, /* access types are as follows */
qualification & EPT_READ_VIOLATION ? 1 : 0,
qualification & EPT_WRITE_VIOLATION ? 1 : 0,
qualification & EPT_EXEC_VIOLATION ? 1 : 0) )