Displaying 9 results from an estimated 9 matches for "kvmi_warn".
2019 Aug 13
1
[RFC PATCH v6 06/92] kvm: introspection: add KVMI_CONTROL_CMD_RESPONSE
...ISTERS vcpu=N
> + KVMI_EVENT_REPLY vcpu=N
> + KVMI_CONTROL_CMD_RESPONSE enable=1 now=0
I don't understand the usage. Is there any case where you want now == 1
actually? Can you just say that KVMI_CONTROL_CMD_RESPONSE never has a
reply, or to make now==enable?
> + if (err)
> + kvmi_warn(ikvm, "Error code %d discarded for message id %d\n",
> + err, msg->id);
> +
Would it make sense to even close the socket if there is an error?
Paolo
2019 Aug 09
0
[RFC PATCH v6 64/92] kvm: introspection: add single-stepping
...vcpu(struct kvm_vcpu *vcpu, bool wait)
return 0;
}
+void kvmi_stop_ss(struct kvm_vcpu *vcpu)
+{
+ struct kvmi_vcpu *ivcpu = IVCPU(vcpu);
+ struct kvm *kvm = vcpu->kvm;
+ struct kvmi *ikvm;
+ int i;
+
+ ikvm = kvmi_get(kvm);
+ if (!ikvm)
+ return;
+
+ if (unlikely(!ivcpu->ss_owner)) {
+ kvmi_warn(ikvm, "%s\n", __func__);
+ goto out;
+ }
+
+ for (i = ikvm->ss_level; i--;)
+ kvmi_set_gfn_access(kvm,
+ ikvm->ss_context[i].gfn,
+ ikvm->ss_context[i].old_access,
+ ikvm->ss_context[i].old_write_bitmap);
+
+ ikvm->ss_level = 0;
+
+ kvmi_arch_stop_sin...
2019 Aug 09
0
[RFC PATCH v6 02/92] kvm: introspection: add basic ioctls (hook/unhook)
...;
#include <linux/kvm_host.h>
+#include <uapi/linux/kvmi.h>
+
+#define kvmi_debug(ikvm, fmt, ...) \
+ kvm_debug("%pU " fmt, &ikvm->uuid, ## __VA_ARGS__)
+#define kvmi_info(ikvm, fmt, ...) \
+ kvm_info("%pU " fmt, &ikvm->uuid, ## __VA_ARGS__)
+#define kvmi_warn(ikvm, fmt, ...) \
+ kvm_info("%pU WARNING: " fmt, &ikvm->uuid, ## __VA_ARGS__)
+#define kvmi_warn_once(ikvm, fmt, ...) ({ \
+ static bool __section(.data.once) __warned; \
+ if (!__warned) { \
+ __warned = true;...
2019 Aug 09
0
[RFC PATCH v6 06/92] kvm: introspection: add KVMI_CONTROL_CMD_RESPONSE
...y(ikvm, msg, err, rpl, rpl_size);
}
+static bool kvmi_validate_no_reply(struct kvmi *ikvm,
+ const struct kvmi_msg_hdr *msg,
+ size_t rpl_size, int err)
+{
+ if (rpl_size) {
+ kvmi_err(ikvm, "Reply disabled for command %d", msg->id);
+ return false;
+ }
+
+ if (err)
+ kvmi_warn(ikvm, "Error code %d discarded for message id %d\n",
+ err, msg->id);
+
+ return true;
+}
+
+static int kvmi_msg_vm_maybe_reply(struct kvmi *ikvm,
+ const struct kvmi_msg_hdr *msg,
+ int err, const void *rpl,
+ size_t rpl_size)
+{
+ if (ikvm->cmd_reply_disabled...
2019 Aug 12
1
[RFC PATCH v6 64/92] kvm: introspection: add single-stepping
...d kvmi_stop_ss(struct kvm_vcpu *vcpu)
> +{
> + struct kvmi_vcpu *ivcpu = IVCPU(vcpu);
> + struct kvm *kvm = vcpu->kvm;
> + struct kvmi *ikvm;
> + int i;
> +
> + ikvm = kvmi_get(kvm);
> + if (!ikvm)
> + return;
> +
> + if (unlikely(!ivcpu->ss_owner)) {
> + kvmi_warn(ikvm, "%s\n", __func__);
> + goto out;
> + }
> +
> + for (i = ikvm->ss_level; i--;)
> + kvmi_set_gfn_access(kvm,
> + ikvm->ss_context[i].gfn,
> + ikvm->ss_context[i].old_access,
> + ikvm->ss_context[i].old_write_bitmap);
> +
&g...
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place
2020 Feb 07
78
[RFC PATCH v7 00/78] VM introspection
The KVM introspection subsystem provides a facility for applications
running on the host or in a separate VM, to control the execution of
other VMs (pause, resume, shutdown), query the state of the vCPUs (GPRs,
MSRs etc.), alter the page access bits in the shadow page tables (only
for the hardware backed ones, eg. Intel's EPT) and receive notifications
when events of interest have taken place
2020 Jul 21
87
[PATCH v9 00/84] VM introspection
The KVM introspection subsystem provides a facility for applications
running on the host or in a separate VM, to control the execution of
other VMs (pause, resume, shutdown), query the state of the vCPUs (GPRs,
MSRs etc.), alter the page access bits in the shadow page tables (only
for the hardware backed ones, eg. Intel's EPT) and receive notifications
when events of interest have taken place