From: Sheng Yang <sheng@linux.intel.com>
To: Avi Kivity <avi@redhat.com>
Cc: kvm@vger.kernel.org, Marcelo Tosatti <mtosatti@redhat.com>,
Joerg Roedel <joerg.roedel@amd.com>
Subject: Re: [PATCH 2/3] KVM: VMX: Simplify pdptr and cr3 management
Date: Tue, 2 Jun 2009 17:22:43 +0800 [thread overview]
Message-ID: <200906021722.44103.sheng@linux.intel.com> (raw)
In-Reply-To: <1243862524-22120-3-git-send-email-avi@redhat.com>
On Monday 01 June 2009 21:22:02 Avi Kivity wrote:
> Instead of reading the PDPTRs from memory after every exit (which is slow
> and wrong, as the PDPTRs are stored on the cpu), sync the PDPTRs from
> memory to the VMCS before entry, and from the VMCS to memory after exit.
> Do the same for cr3.
>
Thanks for fixing!
After review my original code, I found a potential bug. For SDM 3B have this:
23.3.4 Saving Non-Register State
...
If the logical processor supports the 1-setting of the “enable EPT” VM-
execution control, values are saved into the four (4) PDPTE fields as follows:
— If the “enable EPT” VM-execution control is 1 and the logical processor was
using PAE paging at the time of the VM exit, the PDPTE values currently in use
are saved:
• The values saved into bits 11:9 of each of the fields is undefined.
• If the value saved into one of the fields has bit 0 (present) clear, the
value saved into bits 63:1 of that field is undefined. That value need not
correspond to the value that was loaded by VM entry or to any value that
might have been loaded in VMX non-root operation.
• If the value saved into one of the fields has bit 0 (present) set, the value
saved into bits 63:12 of the field is a guest-physical address.
— If the “enable EPT” VM-execution control is 0 or the logical processor was
not using PAE paging at the time of the VM exit, the values saved are
undefined.
But drop the ept_load_pdptrs() when exit and add it in cr0 handling result in
Windows PAE guest hang on boot. I am checking it now. Any thoughts?...
--
regards
Yang, Sheng
> Signed-off-by: Avi Kivity <avi@redhat.com>
> ---
> arch/x86/kvm/vmx.c | 21 +++++++++++++++------
> 1 files changed, 15 insertions(+), 6 deletions(-)
>
> diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
> index 5607de8..1783606 100644
> --- a/arch/x86/kvm/vmx.c
> +++ b/arch/x86/kvm/vmx.c
> @@ -1538,10 +1538,6 @@ static void vmx_decache_cr4_guest_bits(struct
> kvm_vcpu *vcpu) static void ept_load_pdptrs(struct kvm_vcpu *vcpu)
> {
> if (is_paging(vcpu) && is_pae(vcpu) && !is_long_mode(vcpu)) {
> - if (!load_pdptrs(vcpu, vcpu->arch.cr3)) {
> - printk(KERN_ERR "EPT: Fail to load pdptrs!\n");
> - return;
> - }
> vmcs_write64(GUEST_PDPTR0, vcpu->arch.pdptrs[0]);
> vmcs_write64(GUEST_PDPTR1, vcpu->arch.pdptrs[1]);
> vmcs_write64(GUEST_PDPTR2, vcpu->arch.pdptrs[2]);
> @@ -1549,6 +1545,16 @@ static void ept_load_pdptrs(struct kvm_vcpu *vcpu)
> }
> }
>
> +static void ept_save_pdptrs(struct kvm_vcpu *vcpu)
> +{
> + if (is_paging(vcpu) && is_pae(vcpu) && !is_long_mode(vcpu)) {
> + vcpu->arch.pdptrs[0] = vmcs_read64(GUEST_PDPTR0);
> + vcpu->arch.pdptrs[1] = vmcs_read64(GUEST_PDPTR1);
> + vcpu->arch.pdptrs[2] = vmcs_read64(GUEST_PDPTR2);
> + vcpu->arch.pdptrs[3] = vmcs_read64(GUEST_PDPTR3);
> + }
> +}
> +
> static void vmx_set_cr4(struct kvm_vcpu *vcpu, unsigned long cr4);
>
> static void ept_update_paging_mode_cr0(unsigned long *hw_cr0,
> @@ -1642,7 +1648,6 @@ static void vmx_set_cr3(struct kvm_vcpu *vcpu,
> unsigned long cr3) if (enable_ept) {
> eptp = construct_eptp(cr3);
> vmcs_write64(EPT_POINTER, eptp);
> - ept_load_pdptrs(vcpu);
> guest_cr3 = is_paging(vcpu) ? vcpu->arch.cr3 :
> VMX_EPT_IDENTITY_PAGETABLE_ADDR;
> }
> @@ -3199,7 +3204,7 @@ static int vmx_handle_exit(struct kvm_run *kvm_run,
> struct kvm_vcpu *vcpu) * to sync with guest real CR3. */
> if (enable_ept && is_paging(vcpu)) {
> vcpu->arch.cr3 = vmcs_readl(GUEST_CR3);
> - ept_load_pdptrs(vcpu);
> + ept_save_pdptrs(vcpu);
> }
>
> if (unlikely(vmx->fail)) {
> @@ -3376,6 +3381,10 @@ static void vmx_vcpu_run(struct kvm_vcpu *vcpu,
> struct kvm_run *kvm_run) {
> struct vcpu_vmx *vmx = to_vmx(vcpu);
>
> + if (enable_ept && is_paging(vcpu)) {
> + vmcs_writel(GUEST_CR3, vcpu->arch.cr3);
> + ept_load_pdptrs(vcpu);
> + }
> /* Record the guest's net vcpu time for enforced NMI injections. */
> if (unlikely(!cpu_has_virtual_nmis() && vmx->soft_vnmi_blocked))
> vmx->entry_time = ktime_get();
next prev parent reply other threads:[~2009-06-02 9:22 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2009-06-01 13:22 [PATCH 0/3] Cache PDPTRs under ept/npt Avi Kivity
2009-06-01 13:22 ` [PATCH 1/3] KVM: VMX: Avoid duplicate ept tlb flush when setting cr3 Avi Kivity
2009-06-01 13:22 ` [PATCH 2/3] KVM: VMX: Simplify pdptr and cr3 management Avi Kivity
2009-06-02 9:22 ` Sheng Yang [this message]
2009-06-02 9:26 ` Avi Kivity
2009-06-02 9:30 ` Sheng Yang
2009-06-02 9:46 ` Avi Kivity
2009-06-02 9:56 ` Sheng Yang
2009-06-02 10:16 ` Avi Kivity
2009-06-02 11:31 ` Sheng Yang
2009-06-02 11:44 ` Avi Kivity
2009-06-01 13:22 ` [PATCH 3/3] KVM: Cache pdptrs Avi Kivity
2009-06-02 9:04 ` Joerg Roedel
2009-06-02 9:09 ` Avi Kivity
2009-06-02 9:30 ` Joerg Roedel
2009-06-02 9:44 ` Avi Kivity
2009-06-02 11:50 ` Avi Kivity
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=200906021722.44103.sheng@linux.intel.com \
--to=sheng@linux.intel.com \
--cc=avi@redhat.com \
--cc=joerg.roedel@amd.com \
--cc=kvm@vger.kernel.org \
--cc=mtosatti@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox