From: Sheng Yang <sheng@linux.intel.com>
To: Avi Kivity <avi@redhat.com>
Cc: kvm@vger.kernel.org, Marcelo Tosatti <mtosatti@redhat.com>,
Joerg Roedel <joerg.roedel@amd.com>
Subject: Re: [PATCH 2/3] KVM: VMX: Simplify pdptr and cr3 management
Date: Tue, 2 Jun 2009 17:22:43 +0800 [thread overview]
Message-ID: <200906021722.44103.sheng@linux.intel.com> (raw)
In-Reply-To: <1243862524-22120-3-git-send-email-avi@redhat.com>
On Monday 01 June 2009 21:22:02 Avi Kivity wrote:
> Instead of reading the PDPTRs from memory after every exit (which is slow
> and wrong, as the PDPTRs are stored on the cpu), sync the PDPTRs from
> memory to the VMCS before entry, and from the VMCS to memory after exit.
> Do the same for cr3.
>
Thanks for fixing!
After review my original code, I found a potential bug. For SDM 3B have this:
23.3.4 Saving Non-Register State
...
If the logical processor supports the 1-setting of the “enable EPT” VM-
execution control, values are saved into the four (4) PDPTE fields as follows:
— If the “enable EPT” VM-execution control is 1 and the logical processor was
using PAE paging at the time of the VM exit, the PDPTE values currently in use
are saved:
• The values saved into bits 11:9 of each of the fields is undefined.
• If the value saved into one of the fields has bit 0 (present) clear, the
value saved into bits 63:1 of that field is undefined. That value need not
correspond to the value that was loaded by VM entry or to any value that
might have been loaded in VMX non-root operation.
• If the value saved into one of the fields has bit 0 (present) set, the value
saved into bits 63:12 of the field is a guest-physical address.
— If the “enable EPT” VM-execution control is 0 or the logical processor was
not using PAE paging at the time of the VM exit, the values saved are
undefined.
But drop the ept_load_pdptrs() when exit and add it in cr0 handling result in
Windows PAE guest hang on boot. I am checking it now. Any thoughts?...
--
regards
Yang, Sheng
> Signed-off-by: Avi Kivity <avi@redhat.com>
> ---
> arch/x86/kvm/vmx.c | 21 +++++++++++++++------
> 1 files changed, 15 insertions(+), 6 deletions(-)
>
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> index 5607de8..1783606 100644
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -1538,10 +1538,6 @@ static void vmx_decache_cr4_guest_bits(struct
> kvm_vcpu *vcpu) static void ept_load_pdptrs(struct kvm_vcpu *vcpu)
> {
> if (is_paging(vcpu) && is_pae(vcpu) && !is_long_mode(vcpu)) {
> - if (!load_pdptrs(vcpu, vcpu->arch.cr3)) {
> - printk(KERN_ERR "EPT: Fail to load pdptrs!\n");
> - return;
> - }
> vmcs_write64(GUEST_PDPTR0, vcpu->arch.pdptrs[0]);
> vmcs_write64(GUEST_PDPTR1, vcpu->arch.pdptrs[1]);
> vmcs_write64(GUEST_PDPTR2, vcpu->arch.pdptrs[2]);
> @@ -1549,6 +1545,16 @@ static void ept_load_pdptrs(struct kvm_vcpu *vcpu)
> }
> }
>
> +static void ept_save_pdptrs(struct kvm_vcpu *vcpu)
> +{
> + if (is_paging(vcpu) && is_pae(vcpu) && !is_long_mode(vcpu)) {
> + vcpu->arch.pdptrs[0] = vmcs_read64(GUEST_PDPTR0);
> + vcpu->arch.pdptrs[1] = vmcs_read64(GUEST_PDPTR1);
> + vcpu->arch.pdptrs[2] = vmcs_read64(GUEST_PDPTR2);
> + vcpu->arch.pdptrs[3] = vmcs_read64(GUEST_PDPTR3);
> + }
> +}
> +
> static void vmx_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4);
>
> static void ept_update_paging_mode_cr0(unsigned long *hw_cr0,
> @@ -1642,7 +1648,6 @@ static void vmx_set_cr3(struct kvm_vcpu *vcpu,
> unsigned long cr3) if (enable_ept) {
> eptp = construct_eptp(cr3);
> vmcs_write64(EPT_POINTER, eptp);
> - ept_load_pdptrs(vcpu);
> guest_cr3 = is_paging(vcpu) ? vcpu->arch.cr3 :
> VMX_EPT_IDENTITY_PAGETABLE_ADDR;
> }
> @@ -3199,7 +3204,7 @@ static int vmx_handle_exit(struct kvm_run *kvm_run,
> struct kvm_vcpu *vcpu) * to sync with guest real CR3. */
> if (enable_ept && is_paging(vcpu)) {
> vcpu->arch.cr3 = vmcs_readl(GUEST_CR3);
> - ept_load_pdptrs(vcpu);
> + ept_save_pdptrs(vcpu);
> }
>
> if (unlikely(vmx->fail)) {
> @@ -3376,6 +3381,10 @@ static void vmx_vcpu_run(struct kvm_vcpu *vcpu,
> struct kvm_run *kvm_run) {
> struct vcpu_vmx *vmx = to_vmx(vcpu);
>
> + if (enable_ept && is_paging(vcpu)) {
> + vmcs_writel(GUEST_CR3, vcpu->arch.cr3);
> + ept_load_pdptrs(vcpu);
> + }
> /* Record the guest's net vcpu time for enforced NMI injections. */
> if (unlikely(!cpu_has_virtual_nmis() && vmx->soft_vnmi_blocked))
> vmx->entry_time = ktime_get();
next prev parent reply other threads:[~2009-06-02 9:22 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-06-01 13:22 [PATCH 0/3] Cache PDPTRs under ept/npt Avi Kivity
2009-06-01 13:22 ` [PATCH 1/3] KVM: VMX: Avoid duplicate ept tlb flush when setting cr3 Avi Kivity
2009-06-01 13:22 ` [PATCH 2/3] KVM: VMX: Simplify pdptr and cr3 management Avi Kivity
2009-06-02 9:22 ` Sheng Yang [this message]
2009-06-02 9:26 ` Avi Kivity
2009-06-02 9:30 ` Sheng Yang
2009-06-02 9:46 ` Avi Kivity
2009-06-02 9:56 ` Sheng Yang
2009-06-02 10:16 ` Avi Kivity
2009-06-02 11:31 ` Sheng Yang
2009-06-02 11:44 ` Avi Kivity
2009-06-01 13:22 ` [PATCH 3/3] KVM: Cache pdptrs Avi Kivity
2009-06-02 9:04 ` Joerg Roedel
2009-06-02 9:09 ` Avi Kivity
2009-06-02 9:30 ` Joerg Roedel
2009-06-02 9:44 ` Avi Kivity
2009-06-02 11:50 ` Avi Kivity
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200906021722.44103.sheng@linux.intel.com \
--to=sheng@linux.intel.com \
--cc=avi@redhat.com \
--cc=joerg.roedel@amd.com \
--cc=kvm@vger.kernel.org \
--cc=mtosatti@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.