Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit ec87fe2a authored by Avi Kivity's avatar Avi Kivity
Browse files

KVM: MMU: Document cr0.wp emulation



Signed-off-by: default avatarAvi Kivity <avi@redhat.com>
parent 8184dd38
Loading
Loading
Loading
Loading
+19 −0
Original line number Diff line number Diff line
@@ -298,6 +298,25 @@ Host translation updates:
  - look up affected sptes through reverse map
  - drop (or update) translations

Emulating cr0.wp
================

If tdp is not enabled, the host must keep cr0.wp=1 so page write protection
works for the guest kernel, not guest guest userspace.  When the guest
cr0.wp=1, this does not present a problem.  However when the guest cr0.wp=0,
we cannot map the permissions for gpte.u=1, gpte.w=0 to any spte (the
semantics require allowing any guest kernel access plus user read access).

We handle this by mapping the permissions to two possible sptes, depending
on fault type:

- kernel write fault: spte.u=0, spte.w=1 (allows full kernel access,
  disallows user access)
- read fault: spte.u=1, spte.w=0 (allows full read access, disallows kernel
  write access)

(user write faults generate a #PF)

Further reading
===============