All of lore.kernel.org
 help / color / mirror / Atom feed
From: Avi Kivity <avi@redhat.com>
To: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>, KVM <kvm@vger.kernel.org>,
	LKML <linux-kernel@vger.kernel.org>
Subject: Re: [PATCH v3 5/6] KVM: MMU: abstract invalid guest pte mapping
Date: Mon, 22 Nov 2010 11:28:06 +0200	[thread overview]
Message-ID: <4CEA37A6.8040204@redhat.com> (raw)
In-Reply-To: <4CE63DB3.9010100@cn.fujitsu.com>

On 11/19/2010 11:04 AM, Xiao Guangrong wrote:
> Introduce a common function to map invalid gpte
>
> Signed-off-by: Xiao Guangrong<xiaoguangrong@cn.fujitsu.com>
> ---
>   arch/x86/kvm/mmu.c         |    3 --
>   arch/x86/kvm/paging_tmpl.h |   71 +++++++++++++++++++++++---------------------
>   2 files changed, 37 insertions(+), 37 deletions(-)
>
> diff --git a/arch/x86/kvm/mmu.c b/arch/x86/kvm/mmu.c
> index d878dd1..e3d2ee0 100644
> --- a/arch/x86/kvm/mmu.c
> +++ b/arch/x86/kvm/mmu.c
> @@ -3074,9 +3074,6 @@ static void mmu_pte_write_new_pte(struct kvm_vcpu *vcpu,
>   		return;
>           }
>
> -	if (is_rsvd_bits_set(&vcpu->arch.mmu, *(u64 *)new, PT_PAGE_TABLE_LEVEL))
> -		return;
> -
>   	++vcpu->kvm->stat.mmu_pte_updated;
>   	if (!sp->role.cr4_pae)
>   		paging32_update_pte(vcpu, sp, spte, new);
> diff --git a/arch/x86/kvm/paging_tmpl.h b/arch/x86/kvm/paging_tmpl.h
> index 60f00db..dfb906f 100644
> --- a/arch/x86/kvm/paging_tmpl.h
> +++ b/arch/x86/kvm/paging_tmpl.h
> @@ -299,25 +299,42 @@ static int FNAME(walk_addr_nested)(struct guest_walker *walker,
>   					addr, access);
>   }
>
> +static bool FNAME(map_invalid_gpte)(struct kvm_vcpu *vcpu,
> +				    struct kvm_mmu_page *sp, u64 *spte,
> +				    pt_element_t gpte)

It's really only for speculative maps, the name should reflect that.

Why restrict to invalid gptes?  Won't it work for valid gptes as well?  
Maybe you'll need an extra code path for update_pte() which already 
knows the pfn.

> +{
> +	u64 nonpresent = shadow_trap_nonpresent_pte;
> +
> +	if (is_rsvd_bits_set(&vcpu->arch.mmu, gpte, PT_PAGE_TABLE_LEVEL))
> +		goto no_present;
> +
> +	if (!is_present_gpte(gpte)) {
> +		if (!sp->unsync)
> +			nonpresent = shadow_notrap_nonpresent_pte;
> +		goto no_present;
> +	}

I think the order is reversed.  If !is_present_gpte(), it doesn't matter 
if reserved bits are set or not.

> +
> +	if (!(gpte&  PT_ACCESSED_MASK))
> +		goto no_present;
> +
> +	return false;
> +
> +no_present:
> +	drop_spte(vcpu->kvm, spte, nonpresent);
> +	return true;
> +}
> +
>   static void FNAME(update_pte)(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp,
>   			      u64 *spte, const void *pte)
>   {
>   	pt_element_t gpte;
>   	unsigned pte_access;
>   	pfn_t pfn;
> -	u64 new_spte;
>
>   	gpte = *(const pt_element_t *)pte;
> -	if (~gpte&  (PT_PRESENT_MASK | PT_ACCESSED_MASK)) {
> -		if (!is_present_gpte(gpte)) {
> -			if (sp->unsync)
> -				new_spte = shadow_trap_nonpresent_pte;
> -			else
> -				new_spte = shadow_notrap_nonpresent_pte;
> -			__set_spte(spte, new_spte);
> -		}
> +	if (FNAME(map_invalid_gpte)(vcpu, sp, spte, gpte))
>   		return;
> -	}
> +
>   	pgprintk("%s: gpte %llx spte %p\n", __func__, (u64)gpte, spte);
>   	pte_access = sp->role.access&  FNAME(gpte_access)(vcpu, gpte);
>   	if (gpte_to_gfn(gpte) != vcpu->arch.update_pte.gfn)
> @@ -364,7 +381,6 @@ static void FNAME(pte_prefetch)(struct kvm_vcpu *vcpu, struct guest_walker *gw,
>   				u64 *sptep)
>   {
>   	struct kvm_mmu_page *sp;
> -	struct kvm_mmu *mmu =&vcpu->arch.mmu;
>   	pt_element_t *gptep = gw->prefetch_ptes;
>   	u64 *spte;
>   	int i;
> @@ -395,16 +411,7 @@ static void FNAME(pte_prefetch)(struct kvm_vcpu *vcpu, struct guest_walker *gw,
>
>   		gpte = gptep[i];
>
> -		if (is_rsvd_bits_set(mmu, gpte, PT_PAGE_TABLE_LEVEL))
> -			continue;
> -
> -		if (!is_present_gpte(gpte)) {
> -			if (!sp->unsync)
> -				__set_spte(spte, shadow_notrap_nonpresent_pte);
> -			continue;
> -		}
> -
> -		if (!(gpte&  PT_ACCESSED_MASK))
> +		if (FNAME(map_invalid_gpte)(vcpu, sp, spte, gpte))
>   			continue;
>

Ah, I see where it came from.  But I think the other places get it right.

>   		pte_access = sp->role.access&  FNAME(gpte_access)(vcpu, gpte);
> @@ -761,7 +768,6 @@ static int FNAME(sync_page)(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp)
>   		pt_element_t gpte;
>   		gpa_t pte_gpa;
>   		gfn_t gfn;
> -		bool rsvd_bits_set;
>
>   		if (!is_shadow_present_pte(sp->spt[i]))
>   			continue;
> @@ -773,18 +779,15 @@ static int FNAME(sync_page)(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp)
>   			return -EINVAL;
>
>   		gfn = gpte_to_gfn(gpte);
> -		rsvd_bits_set = is_rsvd_bits_set(&vcpu->arch.mmu, gpte,
> -						 PT_PAGE_TABLE_LEVEL);
> -		if (rsvd_bits_set || gfn != sp->gfns[i] ||
> -		      !is_present_gpte(gpte) || !(gpte&  PT_ACCESSED_MASK)) {
> -			u64 nonpresent;
> -
> -			if (rsvd_bits_set || is_present_gpte(gpte) ||
> -			      sp->unsync)
> -				nonpresent = shadow_trap_nonpresent_pte;
> -			else
> -				nonpresent = shadow_notrap_nonpresent_pte;
> -			drop_spte(vcpu->kvm,&sp->spt[i], nonpresent);
> +
> +		if (FNAME(map_invalid_gpte)(vcpu, sp,&sp->spt[i], gpte)) {
> +			kvm_flush_remote_tlbs(vcpu->kvm);
> +			continue;
> +		}
> +
> +		if (gfn != sp->gfns[i]) {
> +			drop_spte(vcpu->kvm,&sp->spt[i],
> +				      shadow_trap_nonpresent_pte);
>   			kvm_flush_remote_tlbs(vcpu->kvm);
>   			continue;
>   		}


-- 
error compiling committee.c: too many arguments to function


  reply	other threads:[~2010-11-22  9:28 UTC|newest]

Thread overview: 17+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2010-11-19  9:01 [PATCH v3 1/6] KVM: MMU: fix forgot flush tlbs on sync_page path Xiao Guangrong
2010-11-19  9:02 ` [PATCH v3 2/6] KVM: MMU: don't drop spte if overwrite it from W to RO Xiao Guangrong
2010-11-19  9:03 ` [PATCH v3 3/6] KVM: MMU: rename 'reset_host_protection' to 'host_writable' Xiao Guangrong
2010-11-19  9:04 ` [PATCH v3 4/6] KVM: MMU: remove 'clear_unsync' parameter Xiao Guangrong
2010-11-19  9:04 ` [PATCH v3 5/6] KVM: MMU: abstract invalid guest pte mapping Xiao Guangrong
2010-11-22  9:28   ` Avi Kivity [this message]
2010-11-22 10:18     ` Xiao Guangrong
2010-11-22 10:17       ` Avi Kivity
2010-11-23  3:08     ` Xiao Guangrong
2010-11-19  9:05 ` [PATCH v3 6/6] KVM: MMU: delay flush all tlbs on sync_page path Xiao Guangrong
2010-11-19 16:11   ` Marcelo Tosatti
2010-11-22  3:45     ` Xiao Guangrong
2010-11-22 14:19       ` Marcelo Tosatti
2010-11-22 21:46         ` Marcelo Tosatti
2010-11-23  3:13           ` Xiao Guangrong
2010-11-26  1:37 ` [PATCH v3 1/6] KVM: MMU: fix forgot flush " Xiao Guangrong
2010-11-26 14:29   ` Marcelo Tosatti

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4CEA37A6.8040204@redhat.com \
    --to=avi@redhat.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=mtosatti@redhat.com \
    --cc=xiaoguangrong@cn.fujitsu.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.