On 06/29/2011 06:24 PM, Yang, Wei wrote:
> +
> + /*
> + * Here we write the ro user page when
> + * cr0.wp=0, then we execute it and SMEP
> + * fault should happen.
> + */
> + err_prepare_notwp = ac_test_do_access(&at1);
> + if (!err_prepare_notwp) {
> + printf("%s: SMEP prepare fail\n", __FUNCTION__);
> + goto clean_up;
> + }
> +
> + at1.flags[AC_ACCESS_WRITE] = 0;
> + at1.flags[AC_ACCESS_FETCH] = 1;
> + ac_set_expected_status(&at1);
> + err_smep_notwp = ac_test_do_access(&at1);
> +
The address is accessed in the fist test, it is really "prefetch"-ed
in the second test?
>
> int ac_test_run(void)
> @@ -669,16 +765,22 @@ int ac_test_run(void)
> ac_test_t at;
> ac_pool_t pool;
> int i, tests, successes;
> + extern u64 ptl2[];
>
> printf("run\n");
> tests = successes = 0;
> ac_env_int(&pool);
> ac_test_init(&at, (void *)(0x123400000000 + 16 * smp_id()));
> do {
> + if (at.flags[AC_CPU_CR4_SMEP] && (ptl2[2] & 0x4))
> + ptl2[2] -= 0x4;
It seems you just remove the "U/S" bit, but forget to recover it, it can
break the test if AC_ACCESS_USER && !SMEP
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html