From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1NopLb-0007AI-6e for qemu-devel@nongnu.org; Mon, 08 Mar 2010 21:39:03 -0500 Received: from [199.232.76.173] (port=35357 helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1NopLa-00079z-R8 for qemu-devel@nongnu.org; Mon, 08 Mar 2010 21:39:02 -0500 Received: from Debian-exim by monty-python.gnu.org with spam-scanned (Exim 4.60) (envelope-from ) id 1NopLY-0002YL-WF for qemu-devel@nongnu.org; Mon, 08 Mar 2010 21:39:02 -0500 Received: from mx20.gnu.org ([199.232.41.8]:62289) by monty-python.gnu.org with esmtps (TLS-1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.60) (envelope-from ) id 1NopLY-0002Xj-4k for qemu-devel@nongnu.org; Mon, 08 Mar 2010 21:39:00 -0500 Received: from mx1.redhat.com ([209.132.183.28]) by mx20.gnu.org with esmtp (Exim 4.60) (envelope-from ) id 1NopLS-00013j-VL for qemu-devel@nongnu.org; Mon, 08 Mar 2010 21:38:55 -0500 Message-Id: <20100309015644.272624611@redhat.com> Date: Mon, 08 Mar 2010 22:53:46 -0300 From: Marcelo Tosatti References: <20100309015343.901738854@redhat.com> Content-Disposition: inline; filename=identity-map Subject: [Qemu-devel] [patch 3/3] kvm: allow qemu to set EPT identity mapping address List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: kvm@vger.kernel.org, qemu-devel@nongnu.org Cc: Marcelo Tosatti From: Sheng Yang If we use larger BIOS image than current 256KB, we would need move reserved TSS and EPT identity mapping pages. Currently TSS support this, but not EPT. Signed-off-by: Marcelo Tosatti Index: qemu-kvm/target-i386/kvm.c =================================================================== --- qemu-kvm.orig/target-i386/kvm.c +++ qemu-kvm/target-i386/kvm.c @@ -341,6 +341,24 @@ static int kvm_has_msr_star(CPUState *en return 0; } +static int kvm_init_identity_map_page(KVMState *s) +{ +#ifdef KVM_CAP_SET_IDENTITY_MAP_ADDR + int ret; + uint64_t addr = 0xfffbc000; + + if (!kvm_check_extension(s, KVM_CAP_SET_IDENTITY_MAP_ADDR)) + return 0; + + ret = kvm_vm_ioctl(s, KVM_SET_IDENTITY_MAP_ADDR, &addr); + if (ret < 0) { + fprintf(stderr, "kvm_set_identity_map_addr: %s\n", strerror(ret)); + return ret; + } +#endif + return 0; +} + int kvm_arch_init(KVMState *s, int smp_cpus) { int ret; @@ -368,7 +386,11 @@ int kvm_arch_init(KVMState *s, int smp_c perror("e820_add_entry() table is full"); exit(1); } - return kvm_vm_ioctl(s, KVM_SET_TSS_ADDR, 0xfffbd000); + ret = kvm_vm_ioctl(s, KVM_SET_TSS_ADDR, 0xfffbd000); + if (ret < 0) + return ret; + + return kvm_init_identity_map_page(s); } static void set_v8086_seg(struct kvm_segment *lhs, const SegmentCache *rhs)