public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Anthony Liguori <anthony@codemonkey.ws>
To: Alexander Graf <agraf@suse.de>
Cc: kvm@vger.kernel.org, joro@8bytes.org, avi@redhat.com
Subject: Re: [PATCH 2/9] Add helper functions for nested SVM v5
Date: Thu, 30 Oct 2008 14:10:29 -0500	[thread overview]
Message-ID: <490A06A5.1020803@codemonkey.ws> (raw)
In-Reply-To: <1EFD5A82-CD91-4EAB-84DF-3D7BCB72D886@suse.de>

Alexander Graf wrote:
>
> On 30.10.2008, at 18:56, Anthony Liguori wrote:
>
>>
>>
>>> /* enable NPT for AMD64 and X86 with PAE */
>>> #if defined(CONFIG_X86_64) || defined(CONFIG_X86_PAE)
>>> static bool npt_enabled = true;
>>> @@ -1145,6 +1155,84 @@ static int vmmcall_interception(struct 
>>> vcpu_svm *svm, struct kvm_run *kvm_run)
>>>     return 1;
>>> }
>>> +static int nested_svm_check_permissions(struct vcpu_svm *svm)
>>> +{
>>> +    if (svm->vmcb->save.cpl) {
>>> +        printk(KERN_ERR "%s: invalid cpl 0x%x at ip 0x%lx\n",
>>> +               __func__, svm->vmcb->save.cpl, 
>>> kvm_rip_read(&svm->vcpu));
>>> +        kvm_queue_exception(&svm->vcpu, GP_VECTOR);
>>>
>>
>> GPFs need an error code.  Do you really think a GP should be 
>> delivered before checking SVME though?  I think you ought to switch 
>> the order of these checks.
>
> Nice catch. The spec also says SVME is checked before CPL.
> What error code exactly would we need here?

I don't know, I would have to look at the spec.  Joerg may know.

>>> +        return 1;
>>> +    }
>>> +
>>> +       if (!(svm->vcpu.arch.shadow_efer & MSR_EFER_SVME_MASK)
>>> +           || !is_paging(&svm->vcpu)) {
>>> +               kvm_queue_exception(&svm->vcpu, UD_VECTOR);
>>> +               return 1;
>>> +       }
>>> +
>>> +       return 0;
>>> +}
>>> +
>>> +static struct page *nested_svm_get_page(struct vcpu_svm *svm, u64 gpa)
>>> +{
>>> +    struct page *page;
>>> +
>>> +    down_read(&current->mm->mmap_sem);
>>> +    page = gfn_to_page(svm->vcpu.kvm, gpa >> PAGE_SHIFT);
>>> +    up_read(&current->mm->mmap_sem);
>>> +
>>> +    if (is_error_page(page)) {
>>> +        printk(KERN_ERR "%s: could not find page at 0x%llx\n",
>>> +               __func__, gpa);
>>> +        kvm_release_page_clean(page);
>>> +        kvm_queue_exception(&svm->vcpu, GP_VECTOR);
>>> +        return NULL;
>>> +    }
>>> +    return page;
>>> +}
>>> +
>>> +static int nested_svm_do(struct vcpu_svm *svm,
>>> +             u64 arg1_gpa, u64 arg2_gpa, void *opaque,
>>> +             int (*handler)(struct vcpu_svm *svm,
>>> +                    void *arg1,
>>> +                    void *arg2,
>>> +                    void *opaque))
>>> +{
>>> +    struct page *arg1_page;
>>> +    struct page *arg2_page = NULL;
>>> +    void *arg1;
>>> +    void *arg2 = NULL;
>>> +    int retval;
>>> +
>>> +    arg1_page = nested_svm_get_page(svm, arg1_gpa);
>>> +    if(arg1_page == NULL)
>>> +        return 1;
>>> +
>>> +    if (arg2_gpa) {
>>> +        arg2_page = nested_svm_get_page(svm, arg2_gpa);
>>> +        if(arg2_page == NULL) {
>>> +            kvm_release_page_clean(arg1_page);
>>> +            return 1;
>>> +        }
>>> +    }
>>> +
>>> +    arg1 = kmap_atomic(arg1_page, KM_USER0);
>>> +    if (arg2_gpa)
>>> +        arg2 = kmap_atomic(arg2_page, KM_USER1);
>>> +
>>> +    retval = handler(svm, arg1, arg2, opaque);
>>> +
>>> +    kunmap_atomic(arg1, KM_USER0);
>>> +    if (arg2_gpa)
>>> +        kunmap_atomic(arg2, KM_USER1);
>>> +
>>> +    kvm_release_page_dirty(arg1_page);
>>> +    if (arg2_gpa)
>>> +        kvm_release_page_dirty(arg2_page);
>>> +
>>> +    return retval;
>>> +}
>>> +
>>>
>>
>> I appreciate small patches but introducing statics that aren't used 
>> is going to generate warnings when bisecting.  I think that suggests 
>> your splitting things at the wrong level.
>
> I figured warnings are nicer than having a blown-up patch. These 
> functions are basically used within all patches from that one on, so 
> it felt logical to split them up this way. How would you have split 
> them up?

I would have folded them into the first user but this is just an issue 
of personal preference I think.

Regards,

Anthony Liguori


> Alex
>


      reply	other threads:[~2008-10-30 19:10 UTC|newest]

Thread overview: 53+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2008-10-20 17:04 [PATCH 0/9] Add support for nested SVM (kernel) v5 Alexander Graf
2008-10-20 17:04 ` [PATCH 1/9] Clean up VINTR setting v5 Alexander Graf
2008-10-20 17:04   ` [PATCH 2/9] Add helper functions for nested SVM v5 Alexander Graf
2008-10-20 17:04     ` [PATCH 3/9] Implement GIF, clgi and stgi v5 Alexander Graf
2008-10-20 17:04       ` [PATCH 4/9] Implement hsave v5 Alexander Graf
2008-10-20 17:04         ` [PATCH 5/9] Add VMLOAD and VMSAVE handlers v5 Alexander Graf
2008-10-20 17:04           ` [PATCH 6/9] Add VMRUN handler v5 Alexander Graf
2008-10-20 17:04             ` [PATCH 7/9] Add VMEXIT handler and intercepts v5 Alexander Graf
2008-10-20 17:04               ` [PATCH 8/9] allow read access to MSR_VM_VR Alexander Graf
2008-10-20 17:04                 ` [PATCH 9/9] Allow setting the SVME bit v5 Alexander Graf
2008-10-29 13:58                   ` Joerg Roedel
2008-10-29 14:03                     ` Alexander Graf
2008-10-29 14:17                       ` Avi Kivity
2008-10-29 14:07                     ` Avi Kivity
2008-10-30 19:16                   ` Anthony Liguori
2008-10-30 19:24                     ` Avi Kivity
2008-10-30 20:46                       ` Alexander Graf
2008-10-30 20:44                     ` Alexander Graf
2008-10-30 20:52                       ` Anthony Liguori
2008-11-02  9:11                         ` Avi Kivity
2008-11-03  7:37                           ` Alexander Graf
2008-11-03 13:54                             ` Avi Kivity
2008-10-30 19:15                 ` [PATCH 8/9] allow read access to MSR_VM_VR Anthony Liguori
2008-10-31 10:57                   ` Joerg Roedel
2008-10-28 18:38             ` Add VMRUN handler v5 Mike Day
2008-10-29  5:35               ` Alexander Graf
2008-11-18 14:14             ` [PATCH 6/9] " Muli Ben-Yehuda
2008-10-30 18:06           ` [PATCH 5/9] Add VMLOAD and VMSAVE handlers v5 Anthony Liguori
2008-10-30 18:44             ` Alexander Graf
2008-10-30 19:14               ` Anthony Liguori
2008-10-30 21:02                 ` Alexander Graf
2008-10-30 21:38                   ` Anthony Liguori
2008-10-30 18:04         ` [PATCH 4/9] Implement hsave v5 Anthony Liguori
2008-10-30 18:43           ` Alexander Graf
2008-10-30 19:05             ` Anthony Liguori
2008-10-30 19:29             ` Avi Kivity
2008-10-30 20:38               ` Alexander Graf
2008-10-30 20:44                 ` Anthony Liguori
2008-10-30 20:47                   ` Alexander Graf
2008-10-30 22:05                     ` Anthony Liguori
2008-11-02  9:24                 ` Avi Kivity
2008-10-27 19:09       ` Implement GIF, clgi and stgi v5 Mike Day
2008-10-27 19:29         ` Avi Kivity
2008-10-27 19:40           ` Mike Day
2008-10-30 18:02       ` [PATCH 3/9] " Anthony Liguori
2008-10-30 18:10         ` Avi Kivity
2008-10-30 18:35           ` Alexander Graf
2008-10-30 19:08             ` Anthony Liguori
2008-10-30 19:11           ` Anthony Liguori
2008-10-29 13:48     ` [PATCH 2/9] Add helper functions for nested SVM v5 Joerg Roedel
2008-10-30 17:56     ` Anthony Liguori
2008-10-30 18:41       ` Alexander Graf
2008-10-30 19:10         ` Anthony Liguori [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=490A06A5.1020803@codemonkey.ws \
    --to=anthony@codemonkey.ws \
    --cc=agraf@suse.de \
    --cc=avi@redhat.com \
    --cc=joro@8bytes.org \
    --cc=kvm@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox