aboutsummaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/emulate.c
diff options
context:
space:
mode:
authorJoerg Roedel <joerg.roedel@amd.com>2011-04-04 06:39:25 -0400
committerAvi Kivity <avi@redhat.com>2011-05-11 07:57:01 -0400
commitd09beabd7cd4cf70d982ff54656dc6431df80fa4 (patch)
treebfb3d5996f6d2b51d79e0ccc543cbe63d9eaba01 /arch/x86/kvm/emulate.c
parent775fde8648ebc588d07de39457aadc7c2131df2e (diff)
KVM: x86 emulator: Add check_perm callback
This patch adds a check_perm callback for each opcode into the instruction emulator. This will be used to do all necessary permission checks on instructions before checking whether they are intercepted or not. Signed-off-by: Joerg Roedel <joerg.roedel@amd.com> Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'arch/x86/kvm/emulate.c')
-rw-r--r--arch/x86/kvm/emulate.c14
1 files changed, 14 insertions, 0 deletions
diff --git a/arch/x86/kvm/emulate.c b/arch/x86/kvm/emulate.c
index a2c31e527a99..4822824b608b 100644
--- a/arch/x86/kvm/emulate.c
+++ b/arch/x86/kvm/emulate.c
@@ -111,6 +111,7 @@ struct opcode {
111 struct group_dual *gdual; 111 struct group_dual *gdual;
112 struct gprefix *gprefix; 112 struct gprefix *gprefix;
113 } u; 113 } u;
114 int (*check_perm)(struct x86_emulate_ctxt *ctxt);
114}; 115};
115 116
116struct group_dual { 117struct group_dual {
@@ -2425,12 +2426,17 @@ static int em_movdqu(struct x86_emulate_ctxt *ctxt)
2425 2426
2426#define D(_y) { .flags = (_y) } 2427#define D(_y) { .flags = (_y) }
2427#define DI(_y, _i) { .flags = (_y), .intercept = x86_intercept_##_i } 2428#define DI(_y, _i) { .flags = (_y), .intercept = x86_intercept_##_i }
2429#define DIP(_y, _i, _p) { .flags = (_y), .intercept = x86_intercept_##_i, \
2430 .check_perm = (_p) }
2428#define N D(0) 2431#define N D(0)
2429#define G(_f, _g) { .flags = ((_f) | Group), .u.group = (_g) } 2432#define G(_f, _g) { .flags = ((_f) | Group), .u.group = (_g) }
2430#define GD(_f, _g) { .flags = ((_f) | Group | GroupDual), .u.gdual = (_g) } 2433#define GD(_f, _g) { .flags = ((_f) | Group | GroupDual), .u.gdual = (_g) }
2431#define I(_f, _e) { .flags = (_f), .u.execute = (_e) } 2434#define I(_f, _e) { .flags = (_f), .u.execute = (_e) }
2432#define II(_f, _e, _i) \ 2435#define II(_f, _e, _i) \
2433 { .flags = (_f), .u.execute = (_e), .intercept = x86_intercept_##_i } 2436 { .flags = (_f), .u.execute = (_e), .intercept = x86_intercept_##_i }
2437#define IIP(_f, _e, _i, _p) \
2438 { .flags = (_f), .u.execute = (_e), .intercept = x86_intercept_##_i, \
2439 .check_perm = (_p) }
2434#define GP(_f, _g) { .flags = ((_f) | Prefix), .u.gprefix = (_g) } 2440#define GP(_f, _g) { .flags = ((_f) | Prefix), .u.gprefix = (_g) }
2435 2441
2436#define D2bv(_f) D((_f) | ByteOp), D(_f) 2442#define D2bv(_f) D((_f) | ByteOp), D(_f)
@@ -2873,6 +2879,7 @@ done_prefixes:
2873 } 2879 }
2874 2880
2875 c->execute = opcode.u.execute; 2881 c->execute = opcode.u.execute;
2882 c->check_perm = opcode.check_perm;
2876 c->intercept = opcode.intercept; 2883 c->intercept = opcode.intercept;
2877 2884
2878 /* Unrecognised? */ 2885 /* Unrecognised? */
@@ -3136,6 +3143,13 @@ x86_emulate_insn(struct x86_emulate_ctxt *ctxt)
3136 goto done; 3143 goto done;
3137 } 3144 }
3138 3145
3146 /* Do instruction specific permission checks */
3147 if (c->check_perm) {
3148 rc = c->check_perm(ctxt);
3149 if (rc != X86EMUL_CONTINUE)
3150 goto done;
3151 }
3152
3139 if (unlikely(ctxt->guest_mode) && c->intercept) { 3153 if (unlikely(ctxt->guest_mode) && c->intercept) {
3140 rc = ops->intercept(ctxt, c->intercept, 3154 rc = ops->intercept(ctxt, c->intercept,
3141 X86_ICPT_POST_EXCEPT); 3155 X86_ICPT_POST_EXCEPT);