[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
/*
|
|
|
|
* Kernel-based Virtual Machine driver for Linux
|
|
|
|
*
|
|
|
|
* This module enables machines with Intel VT-x extensions to run virtual
|
|
|
|
* machines without emulation or binary translation.
|
|
|
|
*
|
|
|
|
* MMU support
|
|
|
|
*
|
|
|
|
* Copyright (C) 2006 Qumranet, Inc.
|
2010-10-06 20:23:22 +08:00
|
|
|
* Copyright 2010 Red Hat, Inc. and/or its affiliates.
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Yaniv Kamay <yaniv@qumranet.com>
|
|
|
|
* Avi Kivity <avi@qumranet.com>
|
|
|
|
*
|
|
|
|
* This work is licensed under the terms of the GNU GPL, version 2. See
|
|
|
|
* the COPYING file in the top-level directory.
|
|
|
|
*
|
|
|
|
*/
|
2007-06-29 02:15:57 +08:00
|
|
|
|
2010-10-14 17:22:46 +08:00
|
|
|
#include "irq.h"
|
2007-12-14 09:35:10 +08:00
|
|
|
#include "mmu.h"
|
2010-01-21 21:31:49 +08:00
|
|
|
#include "x86.h"
|
2009-06-01 03:58:47 +08:00
|
|
|
#include "kvm_cache_regs.h"
|
2007-06-29 02:15:57 +08:00
|
|
|
|
2007-12-16 17:02:48 +08:00
|
|
|
#include <linux/kvm_host.h>
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/string.h>
|
|
|
|
#include <linux/mm.h>
|
|
|
|
#include <linux/highmem.h>
|
|
|
|
#include <linux/module.h>
|
2007-11-26 20:08:14 +08:00
|
|
|
#include <linux/swap.h>
|
2008-02-23 22:44:30 +08:00
|
|
|
#include <linux/hugetlb.h>
|
2008-02-23 01:21:37 +08:00
|
|
|
#include <linux/compiler.h>
|
2009-12-24 00:35:21 +08:00
|
|
|
#include <linux/srcu.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 16:04:11 +08:00
|
|
|
#include <linux/slab.h>
|
2010-05-31 14:28:19 +08:00
|
|
|
#include <linux/uaccess.h>
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2007-06-29 02:15:57 +08:00
|
|
|
#include <asm/page.h>
|
|
|
|
#include <asm/cmpxchg.h>
|
2007-11-21 20:08:40 +08:00
|
|
|
#include <asm/io.h>
|
2008-11-18 05:03:13 +08:00
|
|
|
#include <asm/vmx.h>
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2008-02-07 20:47:41 +08:00
|
|
|
/*
|
|
|
|
* When setting this variable to true it enables Two-Dimensional-Paging
|
|
|
|
* where the hardware walks 2 page tables:
|
|
|
|
* 1. the guest-virtual to guest-physical
|
|
|
|
* 2. while doing 1. it walks guest-physical to host-physical
|
|
|
|
* If the hardware supports that we don't need to do shadow paging.
|
|
|
|
*/
|
2008-02-23 01:21:37 +08:00
|
|
|
bool tdp_enabled = false;
|
2008-02-07 20:47:41 +08:00
|
|
|
|
2010-08-30 18:22:53 +08:00
|
|
|
enum {
|
|
|
|
AUDIT_PRE_PAGE_FAULT,
|
|
|
|
AUDIT_POST_PAGE_FAULT,
|
|
|
|
AUDIT_PRE_PTE_WRITE,
|
2010-09-27 18:09:29 +08:00
|
|
|
AUDIT_POST_PTE_WRITE,
|
|
|
|
AUDIT_PRE_SYNC,
|
|
|
|
AUDIT_POST_SYNC
|
2010-08-30 18:22:53 +08:00
|
|
|
};
|
2007-01-06 08:36:56 +08:00
|
|
|
|
2010-08-30 18:22:53 +08:00
|
|
|
#undef MMU_DEBUG
|
2007-01-06 08:36:56 +08:00
|
|
|
|
|
|
|
#ifdef MMU_DEBUG
|
|
|
|
|
|
|
|
#define pgprintk(x...) do { if (dbg) printk(x); } while (0)
|
|
|
|
#define rmap_printk(x...) do { if (dbg) printk(x); } while (0)
|
|
|
|
|
|
|
|
#else
|
|
|
|
|
|
|
|
#define pgprintk(x...) do { } while (0)
|
|
|
|
#define rmap_printk(x...) do { } while (0)
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2010-08-30 18:22:53 +08:00
|
|
|
#ifdef MMU_DEBUG
|
2012-01-13 07:02:18 +08:00
|
|
|
static bool dbg = 0;
|
2008-06-22 21:45:24 +08:00
|
|
|
module_param(dbg, bool, 0644);
|
2007-01-06 08:36:56 +08:00
|
|
|
#endif
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2007-04-25 14:17:25 +08:00
|
|
|
#ifndef MMU_DEBUG
|
|
|
|
#define ASSERT(x) do { } while (0)
|
|
|
|
#else
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
#define ASSERT(x) \
|
|
|
|
if (!(x)) { \
|
|
|
|
printk(KERN_WARNING "assertion failed %s:%d: %s\n", \
|
|
|
|
__FILE__, __LINE__, #x); \
|
|
|
|
}
|
2007-04-25 14:17:25 +08:00
|
|
|
#endif
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2010-08-22 19:12:48 +08:00
|
|
|
#define PTE_PREFETCH_NUM 8
|
|
|
|
|
2012-06-07 18:26:07 +08:00
|
|
|
#define PT_FIRST_AVAIL_BITS_SHIFT 10
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
#define PT64_SECOND_AVAIL_BITS_SHIFT 52
|
|
|
|
|
|
|
|
#define PT64_LEVEL_BITS 9
|
|
|
|
|
|
|
|
#define PT64_LEVEL_SHIFT(level) \
|
2007-10-08 21:02:08 +08:00
|
|
|
(PAGE_SHIFT + (level - 1) * PT64_LEVEL_BITS)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
|
|
|
#define PT64_INDEX(address, level)\
|
|
|
|
(((address) >> PT64_LEVEL_SHIFT(level)) & ((1 << PT64_LEVEL_BITS) - 1))
|
|
|
|
|
|
|
|
|
|
|
|
#define PT32_LEVEL_BITS 10
|
|
|
|
|
|
|
|
#define PT32_LEVEL_SHIFT(level) \
|
2007-10-08 21:02:08 +08:00
|
|
|
(PAGE_SHIFT + (level - 1) * PT32_LEVEL_BITS)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2009-07-27 22:30:45 +08:00
|
|
|
#define PT32_LVL_OFFSET_MASK(level) \
|
|
|
|
(PT32_BASE_ADDR_MASK & ((1ULL << (PAGE_SHIFT + (((level) - 1) \
|
|
|
|
* PT32_LEVEL_BITS))) - 1))
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
|
|
|
#define PT32_INDEX(address, level)\
|
|
|
|
(((address) >> PT32_LEVEL_SHIFT(level)) & ((1 << PT32_LEVEL_BITS) - 1))
|
|
|
|
|
|
|
|
|
2007-03-09 19:04:31 +08:00
|
|
|
#define PT64_BASE_ADDR_MASK (((1ULL << 52) - 1) & ~(u64)(PAGE_SIZE-1))
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
#define PT64_DIR_BASE_ADDR_MASK \
|
|
|
|
(PT64_BASE_ADDR_MASK & ~((1ULL << (PAGE_SHIFT + PT64_LEVEL_BITS)) - 1))
|
2009-07-27 22:30:45 +08:00
|
|
|
#define PT64_LVL_ADDR_MASK(level) \
|
|
|
|
(PT64_BASE_ADDR_MASK & ~((1ULL << (PAGE_SHIFT + (((level) - 1) \
|
|
|
|
* PT64_LEVEL_BITS))) - 1))
|
|
|
|
#define PT64_LVL_OFFSET_MASK(level) \
|
|
|
|
(PT64_BASE_ADDR_MASK & ((1ULL << (PAGE_SHIFT + (((level) - 1) \
|
|
|
|
* PT64_LEVEL_BITS))) - 1))
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
|
|
|
#define PT32_BASE_ADDR_MASK PAGE_MASK
|
|
|
|
#define PT32_DIR_BASE_ADDR_MASK \
|
|
|
|
(PAGE_MASK & ~((1ULL << (PAGE_SHIFT + PT32_LEVEL_BITS)) - 1))
|
2009-07-27 22:30:45 +08:00
|
|
|
#define PT32_LVL_ADDR_MASK(level) \
|
|
|
|
(PAGE_MASK & ~((1ULL << (PAGE_SHIFT + (((level) - 1) \
|
|
|
|
* PT32_LEVEL_BITS))) - 1))
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2007-11-21 08:06:21 +08:00
|
|
|
#define PT64_PERM_MASK (PT_PRESENT_MASK | PT_WRITABLE_MASK | PT_USER_MASK \
|
|
|
|
| PT64_NX_MASK)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2007-12-09 22:15:46 +08:00
|
|
|
#define ACC_EXEC_MASK 1
|
|
|
|
#define ACC_WRITE_MASK PT_WRITABLE_MASK
|
|
|
|
#define ACC_USER_MASK PT_USER_MASK
|
|
|
|
#define ACC_ALL (ACC_EXEC_MASK | ACC_WRITE_MASK | ACC_USER_MASK)
|
|
|
|
|
2009-12-31 18:10:16 +08:00
|
|
|
#include <trace/events/kvm.h>
|
|
|
|
|
2009-07-06 17:21:32 +08:00
|
|
|
#define CREATE_TRACE_POINTS
|
|
|
|
#include "mmutrace.h"
|
|
|
|
|
2012-06-20 15:58:58 +08:00
|
|
|
#define SPTE_HOST_WRITEABLE (1ULL << PT_FIRST_AVAIL_BITS_SHIFT)
|
|
|
|
#define SPTE_MMU_WRITEABLE (1ULL << (PT_FIRST_AVAIL_BITS_SHIFT + 1))
|
2009-09-24 02:47:17 +08:00
|
|
|
|
2008-08-21 22:49:56 +08:00
|
|
|
#define SHADOW_PT_INDEX(addr, level) PT64_INDEX(addr, level)
|
|
|
|
|
2012-03-21 22:49:39 +08:00
|
|
|
/* make pte_list_desc fit well in cache line */
|
|
|
|
#define PTE_LIST_EXT 3
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
struct pte_list_desc {
|
|
|
|
u64 *sptes[PTE_LIST_EXT];
|
|
|
|
struct pte_list_desc *more;
|
2007-01-06 08:36:38 +08:00
|
|
|
};
|
|
|
|
|
2008-12-25 20:39:47 +08:00
|
|
|
struct kvm_shadow_walk_iterator {
|
|
|
|
u64 addr;
|
|
|
|
hpa_t shadow_addr;
|
|
|
|
u64 *sptep;
|
2011-07-12 03:32:54 +08:00
|
|
|
int level;
|
2008-12-25 20:39:47 +08:00
|
|
|
unsigned index;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define for_each_shadow_entry(_vcpu, _addr, _walker) \
|
|
|
|
for (shadow_walk_init(&(_walker), _vcpu, _addr); \
|
|
|
|
shadow_walk_okay(&(_walker)); \
|
|
|
|
shadow_walk_next(&(_walker)))
|
|
|
|
|
2011-07-12 03:32:13 +08:00
|
|
|
#define for_each_shadow_entry_lockless(_vcpu, _addr, _walker, spte) \
|
|
|
|
for (shadow_walk_init(&(_walker), _vcpu, _addr); \
|
|
|
|
shadow_walk_okay(&(_walker)) && \
|
|
|
|
({ spte = mmu_spte_get_lockless(_walker.sptep); 1; }); \
|
|
|
|
__shadow_walk_next(&(_walker), spte))
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
static struct kmem_cache *pte_list_desc_cache;
|
2007-05-30 17:34:53 +08:00
|
|
|
static struct kmem_cache *mmu_page_header_cache;
|
KVM: create aggregate kvm_total_used_mmu_pages value
Of slab shrinkers, the VM code says:
* Note that 'shrink' will be passed nr_to_scan == 0 when the VM is
* querying the cache size, so a fastpath for that case is appropriate.
and it *means* it. Look at how it calls the shrinkers:
nr_before = (*shrinker->shrink)(0, gfp_mask);
shrink_ret = (*shrinker->shrink)(this_scan, gfp_mask);
So, if you do anything stupid in your shrinker, the VM will doubly
punish you.
The mmu_shrink() function takes the global kvm_lock, then acquires
every VM's kvm->mmu_lock in sequence. If we have 100 VMs, then
we're going to take 101 locks. We do it twice, so each call takes
202 locks. If we're under memory pressure, we can have each cpu
trying to do this. It can get really hairy, and we've seen lock
spinning in mmu_shrink() be the dominant entry in profiles.
This is guaranteed to optimize at least half of those lock
aquisitions away. It removes the need to take any of the locks
when simply trying to count objects.
A 'percpu_counter' can be a large object, but we only have one
of these for the entire system. There are not any better
alternatives at the moment, especially ones that handle CPU
hotplug.
Signed-off-by: Dave Hansen <dave@linux.vnet.ibm.com>
Signed-off-by: Tim Pepper <lnxninja@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2010-08-20 09:11:37 +08:00
|
|
|
static struct percpu_counter kvm_total_used_mmu_pages;
|
2007-04-15 21:31:09 +08:00
|
|
|
|
2008-04-25 21:13:50 +08:00
|
|
|
static u64 __read_mostly shadow_nx_mask;
|
|
|
|
static u64 __read_mostly shadow_x_mask; /* mutual exclusive with nx_mask */
|
|
|
|
static u64 __read_mostly shadow_user_mask;
|
|
|
|
static u64 __read_mostly shadow_accessed_mask;
|
|
|
|
static u64 __read_mostly shadow_dirty_mask;
|
2011-07-12 03:33:44 +08:00
|
|
|
static u64 __read_mostly shadow_mmio_mask;
|
|
|
|
|
|
|
|
static void mmu_spte_set(u64 *sptep, u64 spte);
|
2012-07-08 22:16:30 +08:00
|
|
|
static void mmu_free_roots(struct kvm_vcpu *vcpu);
|
2011-07-12 03:33:44 +08:00
|
|
|
|
|
|
|
void kvm_mmu_set_mmio_spte_mask(u64 mmio_mask)
|
|
|
|
{
|
|
|
|
shadow_mmio_mask = mmio_mask;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_set_mmio_spte_mask);
|
|
|
|
|
|
|
|
static void mark_mmio_spte(u64 *sptep, u64 gfn, unsigned access)
|
|
|
|
{
|
|
|
|
access &= ACC_WRITE_MASK | ACC_USER_MASK;
|
|
|
|
|
2011-07-12 03:34:24 +08:00
|
|
|
trace_mark_mmio_spte(sptep, gfn, access);
|
2011-07-12 03:33:44 +08:00
|
|
|
mmu_spte_set(sptep, shadow_mmio_mask | access | gfn << PAGE_SHIFT);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool is_mmio_spte(u64 spte)
|
|
|
|
{
|
|
|
|
return (spte & shadow_mmio_mask) == shadow_mmio_mask;
|
|
|
|
}
|
|
|
|
|
|
|
|
static gfn_t get_mmio_spte_gfn(u64 spte)
|
|
|
|
{
|
|
|
|
return (spte & ~shadow_mmio_mask) >> PAGE_SHIFT;
|
|
|
|
}
|
|
|
|
|
|
|
|
static unsigned get_mmio_spte_access(u64 spte)
|
|
|
|
{
|
|
|
|
return (spte & ~shadow_mmio_mask) & ~PAGE_MASK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool set_mmio_spte(u64 *sptep, gfn_t gfn, pfn_t pfn, unsigned access)
|
|
|
|
{
|
|
|
|
if (unlikely(is_noslot_pfn(pfn))) {
|
|
|
|
mark_mmio_spte(sptep, gfn, access);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
KVM: Allow not-present guest page faults to bypass kvm
There are two classes of page faults trapped by kvm:
- host page faults, where the fault is needed to allow kvm to install
the shadow pte or update the guest accessed and dirty bits
- guest page faults, where the guest has faulted and kvm simply injects
the fault back into the guest to handle
The second class, guest page faults, is pure overhead. We can eliminate
some of it on vmx using the following evil trick:
- when we set up a shadow page table entry, if the corresponding guest pte
is not present, set up the shadow pte as not present
- if the guest pte _is_ present, mark the shadow pte as present but also
set one of the reserved bits in the shadow pte
- tell the vmx hardware not to trap faults which have the present bit clear
With this, normal page-not-present faults go directly to the guest,
bypassing kvm entirely.
Unfortunately, this trick only works on Intel hardware, as AMD lacks a
way to discriminate among page faults based on error code. It is also
a little risky since it uses reserved bits which might become unreserved
in the future, so a module parameter is provided to disable it.
Signed-off-by: Avi Kivity <avi@qumranet.com>
2007-09-17 00:58:32 +08:00
|
|
|
|
2009-03-30 16:21:08 +08:00
|
|
|
static inline u64 rsvd_bits(int s, int e)
|
|
|
|
{
|
|
|
|
return ((1ULL << (e - s + 1)) - 1) << s;
|
|
|
|
}
|
|
|
|
|
2008-04-25 21:13:50 +08:00
|
|
|
void kvm_mmu_set_mask_ptes(u64 user_mask, u64 accessed_mask,
|
2009-04-27 20:35:42 +08:00
|
|
|
u64 dirty_mask, u64 nx_mask, u64 x_mask)
|
2008-04-25 21:13:50 +08:00
|
|
|
{
|
|
|
|
shadow_user_mask = user_mask;
|
|
|
|
shadow_accessed_mask = accessed_mask;
|
|
|
|
shadow_dirty_mask = dirty_mask;
|
|
|
|
shadow_nx_mask = nx_mask;
|
|
|
|
shadow_x_mask = x_mask;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_set_mask_ptes);
|
|
|
|
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
static int is_cpuid_PSE36(void)
|
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2007-01-26 16:56:41 +08:00
|
|
|
static int is_nx(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2010-01-21 21:31:50 +08:00
|
|
|
return vcpu->arch.efer & EFER_NX;
|
2007-01-26 16:56:41 +08:00
|
|
|
}
|
|
|
|
|
KVM: Allow not-present guest page faults to bypass kvm
There are two classes of page faults trapped by kvm:
- host page faults, where the fault is needed to allow kvm to install
the shadow pte or update the guest accessed and dirty bits
- guest page faults, where the guest has faulted and kvm simply injects
the fault back into the guest to handle
The second class, guest page faults, is pure overhead. We can eliminate
some of it on vmx using the following evil trick:
- when we set up a shadow page table entry, if the corresponding guest pte
is not present, set up the shadow pte as not present
- if the guest pte _is_ present, mark the shadow pte as present but also
set one of the reserved bits in the shadow pte
- tell the vmx hardware not to trap faults which have the present bit clear
With this, normal page-not-present faults go directly to the guest,
bypassing kvm entirely.
Unfortunately, this trick only works on Intel hardware, as AMD lacks a
way to discriminate among page faults based on error code. It is also
a little risky since it uses reserved bits which might become unreserved
in the future, so a module parameter is provided to disable it.
Signed-off-by: Avi Kivity <avi@qumranet.com>
2007-09-17 00:58:32 +08:00
|
|
|
static int is_shadow_present_pte(u64 pte)
|
|
|
|
{
|
2011-07-12 03:33:44 +08:00
|
|
|
return pte & PT_PRESENT_MASK && !is_mmio_spte(pte);
|
KVM: Allow not-present guest page faults to bypass kvm
There are two classes of page faults trapped by kvm:
- host page faults, where the fault is needed to allow kvm to install
the shadow pte or update the guest accessed and dirty bits
- guest page faults, where the guest has faulted and kvm simply injects
the fault back into the guest to handle
The second class, guest page faults, is pure overhead. We can eliminate
some of it on vmx using the following evil trick:
- when we set up a shadow page table entry, if the corresponding guest pte
is not present, set up the shadow pte as not present
- if the guest pte _is_ present, mark the shadow pte as present but also
set one of the reserved bits in the shadow pte
- tell the vmx hardware not to trap faults which have the present bit clear
With this, normal page-not-present faults go directly to the guest,
bypassing kvm entirely.
Unfortunately, this trick only works on Intel hardware, as AMD lacks a
way to discriminate among page faults based on error code. It is also
a little risky since it uses reserved bits which might become unreserved
in the future, so a module parameter is provided to disable it.
Signed-off-by: Avi Kivity <avi@qumranet.com>
2007-09-17 00:58:32 +08:00
|
|
|
}
|
|
|
|
|
2008-02-23 22:44:30 +08:00
|
|
|
static int is_large_pte(u64 pte)
|
|
|
|
{
|
|
|
|
return pte & PT_PAGE_SIZE_MASK;
|
|
|
|
}
|
|
|
|
|
2009-06-10 19:12:05 +08:00
|
|
|
static int is_dirty_gpte(unsigned long pte)
|
2007-10-11 18:32:30 +08:00
|
|
|
{
|
2009-06-10 17:56:54 +08:00
|
|
|
return pte & PT_DIRTY_MASK;
|
2007-10-11 18:32:30 +08:00
|
|
|
}
|
|
|
|
|
2009-06-10 19:12:05 +08:00
|
|
|
static int is_rmap_spte(u64 pte)
|
2007-01-06 08:36:38 +08:00
|
|
|
{
|
2008-03-23 18:18:19 +08:00
|
|
|
return is_shadow_present_pte(pte);
|
2007-01-06 08:36:38 +08:00
|
|
|
}
|
|
|
|
|
2009-06-10 23:27:03 +08:00
|
|
|
static int is_last_spte(u64 pte, int level)
|
|
|
|
{
|
|
|
|
if (level == PT_PAGE_TABLE_LEVEL)
|
|
|
|
return 1;
|
2009-07-27 22:30:44 +08:00
|
|
|
if (is_large_pte(pte))
|
2009-06-10 23:27:03 +08:00
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-04-03 03:46:56 +08:00
|
|
|
static pfn_t spte_to_pfn(u64 pte)
|
2008-03-23 21:06:23 +08:00
|
|
|
{
|
2008-04-03 03:46:56 +08:00
|
|
|
return (pte & PT64_BASE_ADDR_MASK) >> PAGE_SHIFT;
|
2008-03-23 21:06:23 +08:00
|
|
|
}
|
|
|
|
|
2007-11-21 19:54:47 +08:00
|
|
|
static gfn_t pse36_gfn_delta(u32 gpte)
|
|
|
|
{
|
|
|
|
int shift = 32 - PT32_DIR_PSE36_SHIFT - PAGE_SHIFT;
|
|
|
|
|
|
|
|
return (gpte & PT32_DIR_PSE36_MASK) << shift;
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:31:28 +08:00
|
|
|
#ifdef CONFIG_X86_64
|
2009-06-10 19:24:23 +08:00
|
|
|
static void __set_spte(u64 *sptep, u64 spte)
|
2007-05-31 20:46:04 +08:00
|
|
|
{
|
2011-07-12 03:31:28 +08:00
|
|
|
*sptep = spte;
|
2007-05-31 20:46:04 +08:00
|
|
|
}
|
|
|
|
|
2011-07-12 03:31:28 +08:00
|
|
|
static void __update_clear_spte_fast(u64 *sptep, u64 spte)
|
2010-06-06 19:48:06 +08:00
|
|
|
{
|
2011-07-12 03:31:28 +08:00
|
|
|
*sptep = spte;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u64 __update_clear_spte_slow(u64 *sptep, u64 spte)
|
|
|
|
{
|
|
|
|
return xchg(sptep, spte);
|
|
|
|
}
|
2011-07-12 03:32:13 +08:00
|
|
|
|
|
|
|
static u64 __get_spte_lockless(u64 *sptep)
|
|
|
|
{
|
|
|
|
return ACCESS_ONCE(*sptep);
|
|
|
|
}
|
2011-07-12 03:33:44 +08:00
|
|
|
|
|
|
|
static bool __check_direct_spte_mmio_pf(u64 spte)
|
|
|
|
{
|
|
|
|
/* It is valid if the spte is zapped. */
|
|
|
|
return spte == 0ull;
|
|
|
|
}
|
2010-06-06 19:48:06 +08:00
|
|
|
#else
|
2011-07-12 03:31:28 +08:00
|
|
|
union split_spte {
|
|
|
|
struct {
|
|
|
|
u32 spte_low;
|
|
|
|
u32 spte_high;
|
|
|
|
};
|
|
|
|
u64 spte;
|
|
|
|
};
|
2010-06-06 19:48:06 +08:00
|
|
|
|
2011-07-12 03:32:13 +08:00
|
|
|
static void count_spte_clear(u64 *sptep, u64 spte)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *sp = page_header(__pa(sptep));
|
|
|
|
|
|
|
|
if (is_shadow_present_pte(spte))
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* Ensure the spte is completely set before we increase the count */
|
|
|
|
smp_wmb();
|
|
|
|
sp->clear_spte_count++;
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:31:28 +08:00
|
|
|
static void __set_spte(u64 *sptep, u64 spte)
|
|
|
|
{
|
|
|
|
union split_spte *ssptep, sspte;
|
2010-06-06 19:48:06 +08:00
|
|
|
|
2011-07-12 03:31:28 +08:00
|
|
|
ssptep = (union split_spte *)sptep;
|
|
|
|
sspte = (union split_spte)spte;
|
|
|
|
|
|
|
|
ssptep->spte_high = sspte.spte_high;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we map the spte from nonpresent to present, We should store
|
|
|
|
* the high bits firstly, then set present bit, so cpu can not
|
|
|
|
* fetch this spte while we are setting the spte.
|
|
|
|
*/
|
|
|
|
smp_wmb();
|
|
|
|
|
|
|
|
ssptep->spte_low = sspte.spte_low;
|
2010-06-06 19:48:06 +08:00
|
|
|
}
|
|
|
|
|
2011-07-12 03:31:28 +08:00
|
|
|
static void __update_clear_spte_fast(u64 *sptep, u64 spte)
|
|
|
|
{
|
|
|
|
union split_spte *ssptep, sspte;
|
|
|
|
|
|
|
|
ssptep = (union split_spte *)sptep;
|
|
|
|
sspte = (union split_spte)spte;
|
|
|
|
|
|
|
|
ssptep->spte_low = sspte.spte_low;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we map the spte from present to nonpresent, we should clear
|
|
|
|
* present bit firstly to avoid vcpu fetch the old high bits.
|
|
|
|
*/
|
|
|
|
smp_wmb();
|
|
|
|
|
|
|
|
ssptep->spte_high = sspte.spte_high;
|
2011-07-12 03:32:13 +08:00
|
|
|
count_spte_clear(sptep, spte);
|
2011-07-12 03:31:28 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static u64 __update_clear_spte_slow(u64 *sptep, u64 spte)
|
|
|
|
{
|
|
|
|
union split_spte *ssptep, sspte, orig;
|
|
|
|
|
|
|
|
ssptep = (union split_spte *)sptep;
|
|
|
|
sspte = (union split_spte)spte;
|
|
|
|
|
|
|
|
/* xchg acts as a barrier before the setting of the high bits */
|
|
|
|
orig.spte_low = xchg(&ssptep->spte_low, sspte.spte_low);
|
2011-09-19 12:19:51 +08:00
|
|
|
orig.spte_high = ssptep->spte_high;
|
|
|
|
ssptep->spte_high = sspte.spte_high;
|
2011-07-12 03:32:13 +08:00
|
|
|
count_spte_clear(sptep, spte);
|
2011-07-12 03:31:28 +08:00
|
|
|
|
|
|
|
return orig.spte;
|
|
|
|
}
|
2011-07-12 03:32:13 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* The idea using the light way get the spte on x86_32 guest is from
|
|
|
|
* gup_get_pte(arch/x86/mm/gup.c).
|
|
|
|
* The difference is we can not catch the spte tlb flush if we leave
|
|
|
|
* guest mode, so we emulate it by increase clear_spte_count when spte
|
|
|
|
* is cleared.
|
|
|
|
*/
|
|
|
|
static u64 __get_spte_lockless(u64 *sptep)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *sp = page_header(__pa(sptep));
|
|
|
|
union split_spte spte, *orig = (union split_spte *)sptep;
|
|
|
|
int count;
|
|
|
|
|
|
|
|
retry:
|
|
|
|
count = sp->clear_spte_count;
|
|
|
|
smp_rmb();
|
|
|
|
|
|
|
|
spte.spte_low = orig->spte_low;
|
|
|
|
smp_rmb();
|
|
|
|
|
|
|
|
spte.spte_high = orig->spte_high;
|
|
|
|
smp_rmb();
|
|
|
|
|
|
|
|
if (unlikely(spte.spte_low != orig->spte_low ||
|
|
|
|
count != sp->clear_spte_count))
|
|
|
|
goto retry;
|
|
|
|
|
|
|
|
return spte.spte;
|
|
|
|
}
|
2011-07-12 03:33:44 +08:00
|
|
|
|
|
|
|
static bool __check_direct_spte_mmio_pf(u64 spte)
|
|
|
|
{
|
|
|
|
union split_spte sspte = (union split_spte)spte;
|
|
|
|
u32 high_mmio_mask = shadow_mmio_mask >> 32;
|
|
|
|
|
|
|
|
/* It is valid if the spte is zapped. */
|
|
|
|
if (spte == 0ull)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
/* It is valid if the spte is being zapped. */
|
|
|
|
if (sspte.spte_low == 0ull &&
|
|
|
|
(sspte.spte_high & high_mmio_mask) == high_mmio_mask)
|
|
|
|
return true;
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
2011-07-12 03:31:28 +08:00
|
|
|
#endif
|
|
|
|
|
2012-06-20 15:59:18 +08:00
|
|
|
static bool spte_is_locklessly_modifiable(u64 spte)
|
|
|
|
{
|
|
|
|
return !(~spte & (SPTE_HOST_WRITEABLE | SPTE_MMU_WRITEABLE));
|
|
|
|
}
|
|
|
|
|
2010-08-02 16:14:04 +08:00
|
|
|
static bool spte_has_volatile_bits(u64 spte)
|
|
|
|
{
|
2012-06-20 15:59:18 +08:00
|
|
|
/*
|
|
|
|
* Always atomicly update spte if it can be updated
|
|
|
|
* out of mmu-lock, it can ensure dirty bit is not lost,
|
|
|
|
* also, it can help us to get a stable is_writable_pte()
|
|
|
|
* to ensure tlb flush is not missed.
|
|
|
|
*/
|
|
|
|
if (spte_is_locklessly_modifiable(spte))
|
|
|
|
return true;
|
|
|
|
|
2010-08-02 16:14:04 +08:00
|
|
|
if (!shadow_accessed_mask)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (!is_shadow_present_pte(spte))
|
|
|
|
return false;
|
|
|
|
|
2010-08-02 16:15:08 +08:00
|
|
|
if ((spte & shadow_accessed_mask) &&
|
|
|
|
(!is_writable_pte(spte) || (spte & shadow_dirty_mask)))
|
2010-08-02 16:14:04 +08:00
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-08-02 16:15:08 +08:00
|
|
|
static bool spte_is_bit_cleared(u64 old_spte, u64 new_spte, u64 bit_mask)
|
|
|
|
{
|
|
|
|
return (old_spte & bit_mask) && !(new_spte & bit_mask);
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:30:35 +08:00
|
|
|
/* Rules for using mmu_spte_set:
|
|
|
|
* Set the sptep from nonpresent to present.
|
|
|
|
* Note: the sptep being assigned *must* be either not present
|
|
|
|
* or in a state where the hardware will not attempt to update
|
|
|
|
* the spte.
|
|
|
|
*/
|
|
|
|
static void mmu_spte_set(u64 *sptep, u64 new_spte)
|
|
|
|
{
|
|
|
|
WARN_ON(is_shadow_present_pte(*sptep));
|
|
|
|
__set_spte(sptep, new_spte);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Rules for using mmu_spte_update:
|
|
|
|
* Update the state bits, it means the mapped pfn is not changged.
|
2012-06-20 15:58:33 +08:00
|
|
|
*
|
|
|
|
* Whenever we overwrite a writable spte with a read-only one we
|
|
|
|
* should flush remote TLBs. Otherwise rmap_write_protect
|
|
|
|
* will find a read-only spte, even though the writable spte
|
|
|
|
* might be cached on a CPU's TLB, the return value indicates this
|
|
|
|
* case.
|
2011-07-12 03:30:35 +08:00
|
|
|
*/
|
2012-06-20 15:58:33 +08:00
|
|
|
static bool mmu_spte_update(u64 *sptep, u64 new_spte)
|
2010-06-06 20:46:44 +08:00
|
|
|
{
|
2012-06-20 15:59:18 +08:00
|
|
|
u64 old_spte = *sptep;
|
2012-06-20 15:58:33 +08:00
|
|
|
bool ret = false;
|
2010-08-02 16:15:08 +08:00
|
|
|
|
|
|
|
WARN_ON(!is_rmap_spte(new_spte));
|
2010-06-06 20:46:44 +08:00
|
|
|
|
2012-06-20 15:58:33 +08:00
|
|
|
if (!is_shadow_present_pte(old_spte)) {
|
|
|
|
mmu_spte_set(sptep, new_spte);
|
|
|
|
return ret;
|
|
|
|
}
|
2010-08-02 16:15:08 +08:00
|
|
|
|
2012-06-20 15:59:18 +08:00
|
|
|
if (!spte_has_volatile_bits(old_spte))
|
2011-07-12 03:31:28 +08:00
|
|
|
__update_clear_spte_fast(sptep, new_spte);
|
2010-08-02 16:15:08 +08:00
|
|
|
else
|
2011-07-12 03:31:28 +08:00
|
|
|
old_spte = __update_clear_spte_slow(sptep, new_spte);
|
2010-08-02 16:15:08 +08:00
|
|
|
|
2012-06-20 15:59:18 +08:00
|
|
|
/*
|
|
|
|
* For the spte updated out of mmu-lock is safe, since
|
|
|
|
* we always atomicly update it, see the comments in
|
|
|
|
* spte_has_volatile_bits().
|
|
|
|
*/
|
2012-06-20 15:58:33 +08:00
|
|
|
if (is_writable_pte(old_spte) && !is_writable_pte(new_spte))
|
|
|
|
ret = true;
|
|
|
|
|
2010-08-02 16:15:08 +08:00
|
|
|
if (!shadow_accessed_mask)
|
2012-06-20 15:58:33 +08:00
|
|
|
return ret;
|
2010-08-02 16:15:08 +08:00
|
|
|
|
|
|
|
if (spte_is_bit_cleared(old_spte, new_spte, shadow_accessed_mask))
|
|
|
|
kvm_set_pfn_accessed(spte_to_pfn(old_spte));
|
|
|
|
if (spte_is_bit_cleared(old_spte, new_spte, shadow_dirty_mask))
|
|
|
|
kvm_set_pfn_dirty(spte_to_pfn(old_spte));
|
2012-06-20 15:58:33 +08:00
|
|
|
|
|
|
|
return ret;
|
2010-06-06 20:46:44 +08:00
|
|
|
}
|
|
|
|
|
2011-07-12 03:30:35 +08:00
|
|
|
/*
|
|
|
|
* Rules for using mmu_spte_clear_track_bits:
|
|
|
|
* It sets the sptep from present to nonpresent, and track the
|
|
|
|
* state bits, it is used to clear the last level sptep.
|
|
|
|
*/
|
|
|
|
static int mmu_spte_clear_track_bits(u64 *sptep)
|
|
|
|
{
|
|
|
|
pfn_t pfn;
|
|
|
|
u64 old_spte = *sptep;
|
|
|
|
|
|
|
|
if (!spte_has_volatile_bits(old_spte))
|
2011-07-12 03:31:28 +08:00
|
|
|
__update_clear_spte_fast(sptep, 0ull);
|
2011-07-12 03:30:35 +08:00
|
|
|
else
|
2011-07-12 03:31:28 +08:00
|
|
|
old_spte = __update_clear_spte_slow(sptep, 0ull);
|
2011-07-12 03:30:35 +08:00
|
|
|
|
|
|
|
if (!is_rmap_spte(old_spte))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
pfn = spte_to_pfn(old_spte);
|
2012-07-17 21:52:52 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* KVM does not hold the refcount of the page used by
|
|
|
|
* kvm mmu, before reclaiming the page, we should
|
|
|
|
* unmap it from mmu first.
|
|
|
|
*/
|
|
|
|
WARN_ON(!kvm_is_mmio_pfn(pfn) && !page_count(pfn_to_page(pfn)));
|
|
|
|
|
2011-07-12 03:30:35 +08:00
|
|
|
if (!shadow_accessed_mask || old_spte & shadow_accessed_mask)
|
|
|
|
kvm_set_pfn_accessed(pfn);
|
|
|
|
if (!shadow_dirty_mask || (old_spte & shadow_dirty_mask))
|
|
|
|
kvm_set_pfn_dirty(pfn);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Rules for using mmu_spte_clear_no_track:
|
|
|
|
* Directly clear spte without caring the state bits of sptep,
|
|
|
|
* it is used to set the upper level spte.
|
|
|
|
*/
|
|
|
|
static void mmu_spte_clear_no_track(u64 *sptep)
|
|
|
|
{
|
2011-07-12 03:31:28 +08:00
|
|
|
__update_clear_spte_fast(sptep, 0ull);
|
2011-07-12 03:30:35 +08:00
|
|
|
}
|
|
|
|
|
2011-07-12 03:32:13 +08:00
|
|
|
static u64 mmu_spte_get_lockless(u64 *sptep)
|
|
|
|
{
|
|
|
|
return __get_spte_lockless(sptep);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void walk_shadow_page_lockless_begin(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2012-05-14 20:44:06 +08:00
|
|
|
/*
|
|
|
|
* Prevent page table teardown by making any free-er wait during
|
|
|
|
* kvm_flush_remote_tlbs() IPI to all active vcpus.
|
|
|
|
*/
|
|
|
|
local_irq_disable();
|
|
|
|
vcpu->mode = READING_SHADOW_PAGE_TABLES;
|
|
|
|
/*
|
|
|
|
* Make sure a following spte read is not reordered ahead of the write
|
|
|
|
* to vcpu->mode.
|
|
|
|
*/
|
|
|
|
smp_mb();
|
2011-07-12 03:32:13 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void walk_shadow_page_lockless_end(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2012-05-14 20:44:06 +08:00
|
|
|
/*
|
|
|
|
* Make sure the write to vcpu->mode is not reordered in front of
|
|
|
|
* reads to sptes. If it does, kvm_commit_zap_page() can see us
|
|
|
|
* OUTSIDE_GUEST_MODE and proceed to free the shadow page table.
|
|
|
|
*/
|
|
|
|
smp_mb();
|
|
|
|
vcpu->mode = OUTSIDE_GUEST_MODE;
|
|
|
|
local_irq_enable();
|
2011-07-12 03:32:13 +08:00
|
|
|
}
|
|
|
|
|
2007-01-06 08:36:54 +08:00
|
|
|
static int mmu_topup_memory_cache(struct kvm_mmu_memory_cache *cache,
|
2007-09-10 16:28:17 +08:00
|
|
|
struct kmem_cache *base_cache, int min)
|
2007-01-06 08:36:53 +08:00
|
|
|
{
|
|
|
|
void *obj;
|
|
|
|
|
|
|
|
if (cache->nobjs >= min)
|
2007-01-06 08:36:54 +08:00
|
|
|
return 0;
|
2007-01-06 08:36:53 +08:00
|
|
|
while (cache->nobjs < ARRAY_SIZE(cache->objects)) {
|
2007-09-10 16:28:17 +08:00
|
|
|
obj = kmem_cache_zalloc(base_cache, GFP_KERNEL);
|
2007-01-06 08:36:53 +08:00
|
|
|
if (!obj)
|
2007-01-06 08:36:54 +08:00
|
|
|
return -ENOMEM;
|
2007-01-06 08:36:53 +08:00
|
|
|
cache->objects[cache->nobjs++] = obj;
|
|
|
|
}
|
2007-01-06 08:36:54 +08:00
|
|
|
return 0;
|
2007-01-06 08:36:53 +08:00
|
|
|
}
|
|
|
|
|
2011-09-22 16:53:17 +08:00
|
|
|
static int mmu_memory_cache_free_objects(struct kvm_mmu_memory_cache *cache)
|
|
|
|
{
|
|
|
|
return cache->nobjs;
|
|
|
|
}
|
|
|
|
|
2010-05-13 10:06:02 +08:00
|
|
|
static void mmu_free_memory_cache(struct kvm_mmu_memory_cache *mc,
|
|
|
|
struct kmem_cache *cache)
|
2007-01-06 08:36:53 +08:00
|
|
|
{
|
|
|
|
while (mc->nobjs)
|
2010-05-13 10:06:02 +08:00
|
|
|
kmem_cache_free(cache, mc->objects[--mc->nobjs]);
|
2007-01-06 08:36:53 +08:00
|
|
|
}
|
|
|
|
|
2007-07-20 13:18:27 +08:00
|
|
|
static int mmu_topup_memory_cache_page(struct kvm_mmu_memory_cache *cache,
|
2007-09-10 16:28:17 +08:00
|
|
|
int min)
|
2007-07-20 13:18:27 +08:00
|
|
|
{
|
2011-03-04 19:01:10 +08:00
|
|
|
void *page;
|
2007-07-20 13:18:27 +08:00
|
|
|
|
|
|
|
if (cache->nobjs >= min)
|
|
|
|
return 0;
|
|
|
|
while (cache->nobjs < ARRAY_SIZE(cache->objects)) {
|
2011-03-04 19:01:10 +08:00
|
|
|
page = (void *)__get_free_page(GFP_KERNEL);
|
2007-07-20 13:18:27 +08:00
|
|
|
if (!page)
|
|
|
|
return -ENOMEM;
|
2011-03-04 19:01:10 +08:00
|
|
|
cache->objects[cache->nobjs++] = page;
|
2007-07-20 13:18:27 +08:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void mmu_free_memory_cache_page(struct kvm_mmu_memory_cache *mc)
|
|
|
|
{
|
|
|
|
while (mc->nobjs)
|
2007-07-21 14:06:46 +08:00
|
|
|
free_page((unsigned long)mc->objects[--mc->nobjs]);
|
2007-07-20 13:18:27 +08:00
|
|
|
}
|
|
|
|
|
2007-09-10 16:28:17 +08:00
|
|
|
static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
|
2007-01-06 08:36:53 +08:00
|
|
|
{
|
2007-01-06 08:36:54 +08:00
|
|
|
int r;
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
r = mmu_topup_memory_cache(&vcpu->arch.mmu_pte_list_desc_cache,
|
2011-05-15 23:27:08 +08:00
|
|
|
pte_list_desc_cache, 8 + PTE_PREFETCH_NUM);
|
2007-05-30 17:34:53 +08:00
|
|
|
if (r)
|
|
|
|
goto out;
|
2007-12-13 23:50:52 +08:00
|
|
|
r = mmu_topup_memory_cache_page(&vcpu->arch.mmu_page_cache, 8);
|
2007-05-30 17:34:53 +08:00
|
|
|
if (r)
|
|
|
|
goto out;
|
2007-12-13 23:50:52 +08:00
|
|
|
r = mmu_topup_memory_cache(&vcpu->arch.mmu_page_header_cache,
|
2007-09-10 16:28:17 +08:00
|
|
|
mmu_page_header_cache, 4);
|
2007-01-06 08:36:54 +08:00
|
|
|
out:
|
|
|
|
return r;
|
2007-01-06 08:36:53 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void mmu_free_memory_caches(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2011-05-15 23:26:20 +08:00
|
|
|
mmu_free_memory_cache(&vcpu->arch.mmu_pte_list_desc_cache,
|
|
|
|
pte_list_desc_cache);
|
2007-12-13 23:50:52 +08:00
|
|
|
mmu_free_memory_cache_page(&vcpu->arch.mmu_page_cache);
|
2010-05-13 10:06:02 +08:00
|
|
|
mmu_free_memory_cache(&vcpu->arch.mmu_page_header_cache,
|
|
|
|
mmu_page_header_cache);
|
2007-01-06 08:36:53 +08:00
|
|
|
}
|
|
|
|
|
2012-05-29 22:54:26 +08:00
|
|
|
static void *mmu_memory_cache_alloc(struct kvm_mmu_memory_cache *mc)
|
2007-01-06 08:36:53 +08:00
|
|
|
{
|
|
|
|
void *p;
|
|
|
|
|
|
|
|
BUG_ON(!mc->nobjs);
|
|
|
|
p = mc->objects[--mc->nobjs];
|
|
|
|
return p;
|
|
|
|
}
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
static struct pte_list_desc *mmu_alloc_pte_list_desc(struct kvm_vcpu *vcpu)
|
2007-01-06 08:36:53 +08:00
|
|
|
{
|
2012-05-29 22:54:26 +08:00
|
|
|
return mmu_memory_cache_alloc(&vcpu->arch.mmu_pte_list_desc_cache);
|
2007-01-06 08:36:53 +08:00
|
|
|
}
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
static void mmu_free_pte_list_desc(struct pte_list_desc *pte_list_desc)
|
2007-01-06 08:36:53 +08:00
|
|
|
{
|
2011-05-15 23:26:20 +08:00
|
|
|
kmem_cache_free(pte_list_desc_cache, pte_list_desc);
|
2007-01-06 08:36:53 +08:00
|
|
|
}
|
|
|
|
|
2010-05-26 16:49:59 +08:00
|
|
|
static gfn_t kvm_mmu_page_get_gfn(struct kvm_mmu_page *sp, int index)
|
|
|
|
{
|
|
|
|
if (!sp->role.direct)
|
|
|
|
return sp->gfns[index];
|
|
|
|
|
|
|
|
return sp->gfn + (index << ((sp->role.level - 1) * PT64_LEVEL_BITS));
|
|
|
|
}
|
|
|
|
|
|
|
|
static void kvm_mmu_page_set_gfn(struct kvm_mmu_page *sp, int index, gfn_t gfn)
|
|
|
|
{
|
|
|
|
if (sp->role.direct)
|
|
|
|
BUG_ON(gfn != kvm_mmu_page_get_gfn(sp, index));
|
|
|
|
else
|
|
|
|
sp->gfns[index] = gfn;
|
|
|
|
}
|
|
|
|
|
2008-02-23 22:44:30 +08:00
|
|
|
/*
|
2010-12-07 11:59:07 +08:00
|
|
|
* Return the pointer to the large page information for a given gfn,
|
|
|
|
* handling slots that are not large page aligned.
|
2008-02-23 22:44:30 +08:00
|
|
|
*/
|
2010-12-07 11:59:07 +08:00
|
|
|
static struct kvm_lpage_info *lpage_info_slot(gfn_t gfn,
|
|
|
|
struct kvm_memory_slot *slot,
|
|
|
|
int level)
|
2008-02-23 22:44:30 +08:00
|
|
|
{
|
|
|
|
unsigned long idx;
|
|
|
|
|
2012-02-08 11:59:10 +08:00
|
|
|
idx = gfn_to_index(gfn, slot->base_gfn, level);
|
2012-02-08 12:02:18 +08:00
|
|
|
return &slot->arch.lpage_info[level - 2][idx];
|
2008-02-23 22:44:30 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void account_shadowed(struct kvm *kvm, gfn_t gfn)
|
|
|
|
{
|
2009-07-27 22:30:43 +08:00
|
|
|
struct kvm_memory_slot *slot;
|
2010-12-07 11:59:07 +08:00
|
|
|
struct kvm_lpage_info *linfo;
|
2009-07-27 22:30:43 +08:00
|
|
|
int i;
|
2008-02-23 22:44:30 +08:00
|
|
|
|
2010-06-21 16:44:20 +08:00
|
|
|
slot = gfn_to_memslot(kvm, gfn);
|
2009-07-27 22:30:43 +08:00
|
|
|
for (i = PT_DIRECTORY_LEVEL;
|
|
|
|
i < PT_PAGE_TABLE_LEVEL + KVM_NR_PAGE_SIZES; ++i) {
|
2010-12-07 11:59:07 +08:00
|
|
|
linfo = lpage_info_slot(gfn, slot, i);
|
|
|
|
linfo->write_count += 1;
|
2009-07-27 22:30:43 +08:00
|
|
|
}
|
2011-05-15 23:20:27 +08:00
|
|
|
kvm->arch.indirect_shadow_pages++;
|
2008-02-23 22:44:30 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void unaccount_shadowed(struct kvm *kvm, gfn_t gfn)
|
|
|
|
{
|
2009-07-27 22:30:43 +08:00
|
|
|
struct kvm_memory_slot *slot;
|
2010-12-07 11:59:07 +08:00
|
|
|
struct kvm_lpage_info *linfo;
|
2009-07-27 22:30:43 +08:00
|
|
|
int i;
|
2008-02-23 22:44:30 +08:00
|
|
|
|
2010-06-21 16:44:20 +08:00
|
|
|
slot = gfn_to_memslot(kvm, gfn);
|
2009-07-27 22:30:43 +08:00
|
|
|
for (i = PT_DIRECTORY_LEVEL;
|
|
|
|
i < PT_PAGE_TABLE_LEVEL + KVM_NR_PAGE_SIZES; ++i) {
|
2010-12-07 11:59:07 +08:00
|
|
|
linfo = lpage_info_slot(gfn, slot, i);
|
|
|
|
linfo->write_count -= 1;
|
|
|
|
WARN_ON(linfo->write_count < 0);
|
2009-07-27 22:30:43 +08:00
|
|
|
}
|
2011-05-15 23:20:27 +08:00
|
|
|
kvm->arch.indirect_shadow_pages--;
|
2008-02-23 22:44:30 +08:00
|
|
|
}
|
|
|
|
|
2009-07-27 22:30:43 +08:00
|
|
|
static int has_wrprotected_page(struct kvm *kvm,
|
|
|
|
gfn_t gfn,
|
|
|
|
int level)
|
2008-02-23 22:44:30 +08:00
|
|
|
{
|
2008-10-03 22:40:32 +08:00
|
|
|
struct kvm_memory_slot *slot;
|
2010-12-07 11:59:07 +08:00
|
|
|
struct kvm_lpage_info *linfo;
|
2008-02-23 22:44:30 +08:00
|
|
|
|
2010-06-21 16:44:20 +08:00
|
|
|
slot = gfn_to_memslot(kvm, gfn);
|
2008-02-23 22:44:30 +08:00
|
|
|
if (slot) {
|
2010-12-07 11:59:07 +08:00
|
|
|
linfo = lpage_info_slot(gfn, slot, level);
|
|
|
|
return linfo->write_count;
|
2008-02-23 22:44:30 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2009-07-27 22:30:43 +08:00
|
|
|
static int host_mapping_level(struct kvm *kvm, gfn_t gfn)
|
2008-02-23 22:44:30 +08:00
|
|
|
{
|
2010-01-28 19:37:56 +08:00
|
|
|
unsigned long page_size;
|
2009-07-27 22:30:43 +08:00
|
|
|
int i, ret = 0;
|
2008-02-23 22:44:30 +08:00
|
|
|
|
2010-01-28 19:37:56 +08:00
|
|
|
page_size = kvm_host_page_size(kvm, gfn);
|
2008-02-23 22:44:30 +08:00
|
|
|
|
2009-07-27 22:30:43 +08:00
|
|
|
for (i = PT_PAGE_TABLE_LEVEL;
|
|
|
|
i < (PT_PAGE_TABLE_LEVEL + KVM_NR_PAGE_SIZES); ++i) {
|
|
|
|
if (page_size >= KVM_HPAGE_SIZE(i))
|
|
|
|
ret = i;
|
|
|
|
else
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2008-09-17 07:54:47 +08:00
|
|
|
return ret;
|
2008-02-23 22:44:30 +08:00
|
|
|
}
|
|
|
|
|
2011-03-09 15:43:00 +08:00
|
|
|
static struct kvm_memory_slot *
|
|
|
|
gfn_to_memslot_dirty_bitmap(struct kvm_vcpu *vcpu, gfn_t gfn,
|
|
|
|
bool no_dirty_log)
|
2008-02-23 22:44:30 +08:00
|
|
|
{
|
|
|
|
struct kvm_memory_slot *slot;
|
2011-03-09 15:43:00 +08:00
|
|
|
|
|
|
|
slot = gfn_to_memslot(vcpu->kvm, gfn);
|
|
|
|
if (!slot || slot->flags & KVM_MEMSLOT_INVALID ||
|
|
|
|
(no_dirty_log && slot->dirty_bitmap))
|
|
|
|
slot = NULL;
|
|
|
|
|
|
|
|
return slot;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool mapping_level_dirty_bitmap(struct kvm_vcpu *vcpu, gfn_t large_gfn)
|
|
|
|
{
|
2011-06-17 10:25:39 +08:00
|
|
|
return !gfn_to_memslot_dirty_bitmap(vcpu, large_gfn, true);
|
2011-01-14 07:46:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int mapping_level(struct kvm_vcpu *vcpu, gfn_t large_gfn)
|
|
|
|
{
|
|
|
|
int host_level, level, max_level;
|
2008-02-23 22:44:30 +08:00
|
|
|
|
2009-07-27 22:30:43 +08:00
|
|
|
host_level = host_mapping_level(vcpu->kvm, large_gfn);
|
|
|
|
|
|
|
|
if (host_level == PT_PAGE_TABLE_LEVEL)
|
|
|
|
return host_level;
|
|
|
|
|
2010-01-05 19:02:29 +08:00
|
|
|
max_level = kvm_x86_ops->get_lpage_level() < host_level ?
|
|
|
|
kvm_x86_ops->get_lpage_level() : host_level;
|
|
|
|
|
|
|
|
for (level = PT_DIRECTORY_LEVEL; level <= max_level; ++level)
|
2009-07-27 22:30:43 +08:00
|
|
|
if (has_wrprotected_page(vcpu->kvm, large_gfn, level))
|
|
|
|
break;
|
|
|
|
|
|
|
|
return level - 1;
|
2008-02-23 22:44:30 +08:00
|
|
|
}
|
|
|
|
|
2007-09-27 20:11:22 +08:00
|
|
|
/*
|
2011-05-15 23:26:20 +08:00
|
|
|
* Pte mapping structures:
|
2007-01-06 08:36:38 +08:00
|
|
|
*
|
2011-05-15 23:26:20 +08:00
|
|
|
* If pte_list bit zero is zero, then pte_list point to the spte.
|
2007-01-06 08:36:38 +08:00
|
|
|
*
|
2011-05-15 23:26:20 +08:00
|
|
|
* If pte_list bit zero is one, (then pte_list & ~1) points to a struct
|
|
|
|
* pte_list_desc containing more mappings.
|
2009-08-06 02:43:58 +08:00
|
|
|
*
|
2011-05-15 23:26:20 +08:00
|
|
|
* Returns the number of pte entries before the spte was added or zero if
|
2009-08-06 02:43:58 +08:00
|
|
|
* the spte was not added.
|
|
|
|
*
|
2007-01-06 08:36:38 +08:00
|
|
|
*/
|
2011-05-15 23:26:20 +08:00
|
|
|
static int pte_list_add(struct kvm_vcpu *vcpu, u64 *spte,
|
|
|
|
unsigned long *pte_list)
|
2007-01-06 08:36:38 +08:00
|
|
|
{
|
2011-05-15 23:26:20 +08:00
|
|
|
struct pte_list_desc *desc;
|
2009-08-06 02:43:58 +08:00
|
|
|
int i, count = 0;
|
2007-01-06 08:36:38 +08:00
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
if (!*pte_list) {
|
|
|
|
rmap_printk("pte_list_add: %p %llx 0->1\n", spte, *spte);
|
|
|
|
*pte_list = (unsigned long)spte;
|
|
|
|
} else if (!(*pte_list & 1)) {
|
|
|
|
rmap_printk("pte_list_add: %p %llx 1->many\n", spte, *spte);
|
|
|
|
desc = mmu_alloc_pte_list_desc(vcpu);
|
|
|
|
desc->sptes[0] = (u64 *)*pte_list;
|
2009-06-10 19:24:23 +08:00
|
|
|
desc->sptes[1] = spte;
|
2011-05-15 23:26:20 +08:00
|
|
|
*pte_list = (unsigned long)desc | 1;
|
2010-09-18 08:41:02 +08:00
|
|
|
++count;
|
2007-01-06 08:36:38 +08:00
|
|
|
} else {
|
2011-05-15 23:26:20 +08:00
|
|
|
rmap_printk("pte_list_add: %p %llx many->many\n", spte, *spte);
|
|
|
|
desc = (struct pte_list_desc *)(*pte_list & ~1ul);
|
|
|
|
while (desc->sptes[PTE_LIST_EXT-1] && desc->more) {
|
2007-01-06 08:36:38 +08:00
|
|
|
desc = desc->more;
|
2011-05-15 23:26:20 +08:00
|
|
|
count += PTE_LIST_EXT;
|
2009-08-06 02:43:58 +08:00
|
|
|
}
|
2011-05-15 23:26:20 +08:00
|
|
|
if (desc->sptes[PTE_LIST_EXT-1]) {
|
|
|
|
desc->more = mmu_alloc_pte_list_desc(vcpu);
|
2007-01-06 08:36:38 +08:00
|
|
|
desc = desc->more;
|
|
|
|
}
|
2009-06-10 19:24:23 +08:00
|
|
|
for (i = 0; desc->sptes[i]; ++i)
|
2010-09-18 08:41:02 +08:00
|
|
|
++count;
|
2009-06-10 19:24:23 +08:00
|
|
|
desc->sptes[i] = spte;
|
2007-01-06 08:36:38 +08:00
|
|
|
}
|
2009-08-06 02:43:58 +08:00
|
|
|
return count;
|
2007-01-06 08:36:38 +08:00
|
|
|
}
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
static void
|
|
|
|
pte_list_desc_remove_entry(unsigned long *pte_list, struct pte_list_desc *desc,
|
|
|
|
int i, struct pte_list_desc *prev_desc)
|
2007-01-06 08:36:38 +08:00
|
|
|
{
|
|
|
|
int j;
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
for (j = PTE_LIST_EXT - 1; !desc->sptes[j] && j > i; --j)
|
2007-01-06 08:36:38 +08:00
|
|
|
;
|
2009-06-10 19:24:23 +08:00
|
|
|
desc->sptes[i] = desc->sptes[j];
|
|
|
|
desc->sptes[j] = NULL;
|
2007-01-06 08:36:38 +08:00
|
|
|
if (j != 0)
|
|
|
|
return;
|
|
|
|
if (!prev_desc && !desc->more)
|
2011-05-15 23:26:20 +08:00
|
|
|
*pte_list = (unsigned long)desc->sptes[0];
|
2007-01-06 08:36:38 +08:00
|
|
|
else
|
|
|
|
if (prev_desc)
|
|
|
|
prev_desc->more = desc->more;
|
|
|
|
else
|
2011-05-15 23:26:20 +08:00
|
|
|
*pte_list = (unsigned long)desc->more | 1;
|
|
|
|
mmu_free_pte_list_desc(desc);
|
2007-01-06 08:36:38 +08:00
|
|
|
}
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
static void pte_list_remove(u64 *spte, unsigned long *pte_list)
|
2007-01-06 08:36:38 +08:00
|
|
|
{
|
2011-05-15 23:26:20 +08:00
|
|
|
struct pte_list_desc *desc;
|
|
|
|
struct pte_list_desc *prev_desc;
|
2007-01-06 08:36:38 +08:00
|
|
|
int i;
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
if (!*pte_list) {
|
|
|
|
printk(KERN_ERR "pte_list_remove: %p 0->BUG\n", spte);
|
2007-01-06 08:36:38 +08:00
|
|
|
BUG();
|
2011-05-15 23:26:20 +08:00
|
|
|
} else if (!(*pte_list & 1)) {
|
|
|
|
rmap_printk("pte_list_remove: %p 1->0\n", spte);
|
|
|
|
if ((u64 *)*pte_list != spte) {
|
|
|
|
printk(KERN_ERR "pte_list_remove: %p 1->BUG\n", spte);
|
2007-01-06 08:36:38 +08:00
|
|
|
BUG();
|
|
|
|
}
|
2011-05-15 23:26:20 +08:00
|
|
|
*pte_list = 0;
|
2007-01-06 08:36:38 +08:00
|
|
|
} else {
|
2011-05-15 23:26:20 +08:00
|
|
|
rmap_printk("pte_list_remove: %p many->many\n", spte);
|
|
|
|
desc = (struct pte_list_desc *)(*pte_list & ~1ul);
|
2007-01-06 08:36:38 +08:00
|
|
|
prev_desc = NULL;
|
|
|
|
while (desc) {
|
2011-05-15 23:26:20 +08:00
|
|
|
for (i = 0; i < PTE_LIST_EXT && desc->sptes[i]; ++i)
|
2009-06-10 19:24:23 +08:00
|
|
|
if (desc->sptes[i] == spte) {
|
2011-05-15 23:26:20 +08:00
|
|
|
pte_list_desc_remove_entry(pte_list,
|
2007-01-06 08:36:53 +08:00
|
|
|
desc, i,
|
2007-01-06 08:36:38 +08:00
|
|
|
prev_desc);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
prev_desc = desc;
|
|
|
|
desc = desc->more;
|
|
|
|
}
|
2011-05-15 23:26:20 +08:00
|
|
|
pr_err("pte_list_remove: %p many->many\n", spte);
|
2007-01-06 08:36:38 +08:00
|
|
|
BUG();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-05-15 23:27:08 +08:00
|
|
|
typedef void (*pte_list_walk_fn) (u64 *spte);
|
|
|
|
static void pte_list_walk(unsigned long *pte_list, pte_list_walk_fn fn)
|
|
|
|
{
|
|
|
|
struct pte_list_desc *desc;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
if (!*pte_list)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (!(*pte_list & 1))
|
|
|
|
return fn((u64 *)*pte_list);
|
|
|
|
|
|
|
|
desc = (struct pte_list_desc *)(*pte_list & ~1ul);
|
|
|
|
while (desc) {
|
|
|
|
for (i = 0; i < PTE_LIST_EXT && desc->sptes[i]; ++i)
|
|
|
|
fn(desc->sptes[i]);
|
|
|
|
desc = desc->more;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-01-17 18:51:20 +08:00
|
|
|
static unsigned long *__gfn_to_rmap(gfn_t gfn, int level,
|
2011-11-14 17:22:28 +08:00
|
|
|
struct kvm_memory_slot *slot)
|
2011-05-15 23:26:20 +08:00
|
|
|
{
|
2012-07-02 16:57:17 +08:00
|
|
|
unsigned long idx;
|
2011-05-15 23:26:20 +08:00
|
|
|
|
2012-07-02 16:57:17 +08:00
|
|
|
idx = gfn_to_index(gfn, slot->base_gfn, level);
|
2012-08-01 17:03:28 +08:00
|
|
|
return &slot->arch.rmap[level - PT_PAGE_TABLE_LEVEL][idx];
|
2011-05-15 23:26:20 +08:00
|
|
|
}
|
|
|
|
|
2011-11-14 17:22:28 +08:00
|
|
|
/*
|
|
|
|
* Take gfn and return the reverse mapping to it.
|
|
|
|
*/
|
|
|
|
static unsigned long *gfn_to_rmap(struct kvm *kvm, gfn_t gfn, int level)
|
|
|
|
{
|
|
|
|
struct kvm_memory_slot *slot;
|
|
|
|
|
|
|
|
slot = gfn_to_memslot(kvm, gfn);
|
2012-01-17 18:51:20 +08:00
|
|
|
return __gfn_to_rmap(gfn, level, slot);
|
2011-11-14 17:22:28 +08:00
|
|
|
}
|
|
|
|
|
2011-09-22 16:53:17 +08:00
|
|
|
static bool rmap_can_add(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_memory_cache *cache;
|
|
|
|
|
|
|
|
cache = &vcpu->arch.mmu_pte_list_desc_cache;
|
|
|
|
return mmu_memory_cache_free_objects(cache);
|
|
|
|
}
|
|
|
|
|
2011-05-15 23:26:20 +08:00
|
|
|
static int rmap_add(struct kvm_vcpu *vcpu, u64 *spte, gfn_t gfn)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
unsigned long *rmapp;
|
|
|
|
|
|
|
|
sp = page_header(__pa(spte));
|
|
|
|
kvm_mmu_page_set_gfn(sp, spte - sp->spt, gfn);
|
|
|
|
rmapp = gfn_to_rmap(vcpu->kvm, gfn, sp->role.level);
|
|
|
|
return pte_list_add(vcpu, spte, rmapp);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void rmap_remove(struct kvm *kvm, u64 *spte)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
gfn_t gfn;
|
|
|
|
unsigned long *rmapp;
|
|
|
|
|
|
|
|
sp = page_header(__pa(spte));
|
|
|
|
gfn = kvm_mmu_page_get_gfn(sp, spte - sp->spt);
|
|
|
|
rmapp = gfn_to_rmap(kvm, gfn, sp->role.level);
|
|
|
|
pte_list_remove(spte, rmapp);
|
|
|
|
}
|
|
|
|
|
2012-03-21 22:50:34 +08:00
|
|
|
/*
|
|
|
|
* Used by the following functions to iterate through the sptes linked by a
|
|
|
|
* rmap. All fields are private and not assumed to be used outside.
|
|
|
|
*/
|
|
|
|
struct rmap_iterator {
|
|
|
|
/* private fields */
|
|
|
|
struct pte_list_desc *desc; /* holds the sptep if not NULL */
|
|
|
|
int pos; /* index of the sptep */
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Iteration must be started by this function. This should also be used after
|
|
|
|
* removing/dropping sptes from the rmap link because in such cases the
|
|
|
|
* information in the itererator may not be valid.
|
|
|
|
*
|
|
|
|
* Returns sptep if found, NULL otherwise.
|
|
|
|
*/
|
|
|
|
static u64 *rmap_get_first(unsigned long rmap, struct rmap_iterator *iter)
|
|
|
|
{
|
|
|
|
if (!rmap)
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
if (!(rmap & 1)) {
|
|
|
|
iter->desc = NULL;
|
|
|
|
return (u64 *)rmap;
|
|
|
|
}
|
|
|
|
|
|
|
|
iter->desc = (struct pte_list_desc *)(rmap & ~1ul);
|
|
|
|
iter->pos = 0;
|
|
|
|
return iter->desc->sptes[iter->pos];
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Must be used with a valid iterator: e.g. after rmap_get_first().
|
|
|
|
*
|
|
|
|
* Returns sptep if found, NULL otherwise.
|
|
|
|
*/
|
|
|
|
static u64 *rmap_get_next(struct rmap_iterator *iter)
|
|
|
|
{
|
|
|
|
if (iter->desc) {
|
|
|
|
if (iter->pos < PTE_LIST_EXT - 1) {
|
|
|
|
u64 *sptep;
|
|
|
|
|
|
|
|
++iter->pos;
|
|
|
|
sptep = iter->desc->sptes[iter->pos];
|
|
|
|
if (sptep)
|
|
|
|
return sptep;
|
|
|
|
}
|
|
|
|
|
|
|
|
iter->desc = iter->desc->more;
|
|
|
|
|
|
|
|
if (iter->desc) {
|
|
|
|
iter->pos = 0;
|
|
|
|
/* desc->sptes[0] cannot be NULL */
|
|
|
|
return iter->desc->sptes[iter->pos];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:28:04 +08:00
|
|
|
static void drop_spte(struct kvm *kvm, u64 *sptep)
|
2010-07-16 11:28:09 +08:00
|
|
|
{
|
2011-07-12 03:30:35 +08:00
|
|
|
if (mmu_spte_clear_track_bits(sptep))
|
2010-10-25 21:58:22 +08:00
|
|
|
rmap_remove(kvm, sptep);
|
2010-06-06 19:31:27 +08:00
|
|
|
}
|
|
|
|
|
2012-06-20 15:57:39 +08:00
|
|
|
|
|
|
|
static bool __drop_large_spte(struct kvm *kvm, u64 *sptep)
|
|
|
|
{
|
|
|
|
if (is_large_pte(*sptep)) {
|
|
|
|
WARN_ON(page_header(__pa(sptep))->role.level ==
|
|
|
|
PT_PAGE_TABLE_LEVEL);
|
|
|
|
drop_spte(kvm, sptep);
|
|
|
|
--kvm->stat.lpages;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void drop_large_spte(struct kvm_vcpu *vcpu, u64 *sptep)
|
|
|
|
{
|
|
|
|
if (__drop_large_spte(vcpu->kvm, sptep))
|
|
|
|
kvm_flush_remote_tlbs(vcpu->kvm);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2012-06-20 15:58:58 +08:00
|
|
|
* Write-protect on the specified @sptep, @pt_protect indicates whether
|
|
|
|
* spte writ-protection is caused by protecting shadow page table.
|
|
|
|
* @flush indicates whether tlb need be flushed.
|
|
|
|
*
|
|
|
|
* Note: write protection is difference between drity logging and spte
|
|
|
|
* protection:
|
|
|
|
* - for dirty logging, the spte can be set to writable at anytime if
|
|
|
|
* its dirty bitmap is properly set.
|
|
|
|
* - for spte protection, the spte can be writable only after unsync-ing
|
|
|
|
* shadow page.
|
2012-06-20 15:57:39 +08:00
|
|
|
*
|
|
|
|
* Return true if the spte is dropped.
|
|
|
|
*/
|
2012-06-20 15:58:58 +08:00
|
|
|
static bool
|
|
|
|
spte_write_protect(struct kvm *kvm, u64 *sptep, bool *flush, bool pt_protect)
|
2012-06-20 15:57:15 +08:00
|
|
|
{
|
|
|
|
u64 spte = *sptep;
|
|
|
|
|
2012-06-20 15:58:58 +08:00
|
|
|
if (!is_writable_pte(spte) &&
|
|
|
|
!(pt_protect && spte_is_locklessly_modifiable(spte)))
|
2012-06-20 15:57:15 +08:00
|
|
|
return false;
|
|
|
|
|
|
|
|
rmap_printk("rmap_write_protect: spte %p %llx\n", sptep, *sptep);
|
|
|
|
|
2012-06-20 15:58:58 +08:00
|
|
|
if (__drop_large_spte(kvm, sptep)) {
|
|
|
|
*flush |= true;
|
2012-06-20 15:57:15 +08:00
|
|
|
return true;
|
2012-06-20 15:58:58 +08:00
|
|
|
}
|
2012-06-20 15:57:15 +08:00
|
|
|
|
2012-06-20 15:58:58 +08:00
|
|
|
if (pt_protect)
|
|
|
|
spte &= ~SPTE_MMU_WRITEABLE;
|
2012-06-20 15:57:15 +08:00
|
|
|
spte = spte & ~PT_WRITABLE_MASK;
|
2012-06-20 15:58:58 +08:00
|
|
|
|
|
|
|
*flush |= mmu_spte_update(sptep, spte);
|
2012-06-20 15:57:15 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-06-20 15:58:58 +08:00
|
|
|
static bool __rmap_write_protect(struct kvm *kvm, unsigned long *rmapp,
|
|
|
|
int level, bool pt_protect)
|
2007-10-16 20:42:30 +08:00
|
|
|
{
|
2012-03-21 22:50:34 +08:00
|
|
|
u64 *sptep;
|
|
|
|
struct rmap_iterator iter;
|
2012-06-20 15:57:15 +08:00
|
|
|
bool flush = false;
|
2007-01-06 08:36:43 +08:00
|
|
|
|
2012-03-21 22:50:34 +08:00
|
|
|
for (sptep = rmap_get_first(*rmapp, &iter); sptep;) {
|
|
|
|
BUG_ON(!(*sptep & PT_PRESENT_MASK));
|
2012-06-20 15:58:58 +08:00
|
|
|
if (spte_write_protect(kvm, sptep, &flush, pt_protect)) {
|
2012-03-21 22:50:34 +08:00
|
|
|
sptep = rmap_get_first(*rmapp, &iter);
|
2012-06-20 15:57:15 +08:00
|
|
|
continue;
|
2007-12-18 06:08:27 +08:00
|
|
|
}
|
2012-03-01 18:31:22 +08:00
|
|
|
|
2012-06-20 15:57:15 +08:00
|
|
|
sptep = rmap_get_next(&iter);
|
2007-01-06 08:36:43 +08:00
|
|
|
}
|
2008-03-21 00:17:24 +08:00
|
|
|
|
2012-06-20 15:57:15 +08:00
|
|
|
return flush;
|
2012-03-01 18:31:22 +08:00
|
|
|
}
|
|
|
|
|
2012-03-01 18:32:16 +08:00
|
|
|
/**
|
|
|
|
* kvm_mmu_write_protect_pt_masked - write protect selected PT level pages
|
|
|
|
* @kvm: kvm instance
|
|
|
|
* @slot: slot to protect
|
|
|
|
* @gfn_offset: start of the BITS_PER_LONG pages we care about
|
|
|
|
* @mask: indicates which pages we should protect
|
|
|
|
*
|
|
|
|
* Used when we do not need to care about huge page mappings: e.g. during dirty
|
|
|
|
* logging we do not have any such mappings.
|
|
|
|
*/
|
|
|
|
void kvm_mmu_write_protect_pt_masked(struct kvm *kvm,
|
|
|
|
struct kvm_memory_slot *slot,
|
|
|
|
gfn_t gfn_offset, unsigned long mask)
|
2012-03-01 18:31:22 +08:00
|
|
|
{
|
|
|
|
unsigned long *rmapp;
|
|
|
|
|
2012-03-01 18:32:16 +08:00
|
|
|
while (mask) {
|
2012-08-01 17:02:01 +08:00
|
|
|
rmapp = __gfn_to_rmap(slot->base_gfn + gfn_offset + __ffs(mask),
|
|
|
|
PT_PAGE_TABLE_LEVEL, slot);
|
2012-06-20 15:58:58 +08:00
|
|
|
__rmap_write_protect(kvm, rmapp, PT_PAGE_TABLE_LEVEL, false);
|
2008-02-23 22:44:30 +08:00
|
|
|
|
2012-03-01 18:32:16 +08:00
|
|
|
/* clear the first set bit */
|
|
|
|
mask &= mask - 1;
|
|
|
|
}
|
2007-01-06 08:36:43 +08:00
|
|
|
}
|
|
|
|
|
2012-06-20 15:56:53 +08:00
|
|
|
static bool rmap_write_protect(struct kvm *kvm, u64 gfn)
|
2011-11-14 17:24:50 +08:00
|
|
|
{
|
|
|
|
struct kvm_memory_slot *slot;
|
2012-03-01 18:32:16 +08:00
|
|
|
unsigned long *rmapp;
|
|
|
|
int i;
|
2012-06-20 15:56:53 +08:00
|
|
|
bool write_protected = false;
|
2011-11-14 17:24:50 +08:00
|
|
|
|
|
|
|
slot = gfn_to_memslot(kvm, gfn);
|
2012-03-01 18:32:16 +08:00
|
|
|
|
|
|
|
for (i = PT_PAGE_TABLE_LEVEL;
|
|
|
|
i < PT_PAGE_TABLE_LEVEL + KVM_NR_PAGE_SIZES; ++i) {
|
|
|
|
rmapp = __gfn_to_rmap(gfn, i, slot);
|
2012-06-20 15:58:58 +08:00
|
|
|
write_protected |= __rmap_write_protect(kvm, rmapp, i, true);
|
2012-03-01 18:32:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
return write_protected;
|
2011-11-14 17:24:50 +08:00
|
|
|
}
|
|
|
|
|
2009-10-09 19:42:56 +08:00
|
|
|
static int kvm_unmap_rmapp(struct kvm *kvm, unsigned long *rmapp,
|
2012-07-02 16:57:59 +08:00
|
|
|
struct kvm_memory_slot *slot, unsigned long data)
|
2008-07-25 22:24:52 +08:00
|
|
|
{
|
2012-03-21 22:50:34 +08:00
|
|
|
u64 *sptep;
|
|
|
|
struct rmap_iterator iter;
|
2008-07-25 22:24:52 +08:00
|
|
|
int need_tlb_flush = 0;
|
|
|
|
|
2012-03-21 22:50:34 +08:00
|
|
|
while ((sptep = rmap_get_first(*rmapp, &iter))) {
|
|
|
|
BUG_ON(!(*sptep & PT_PRESENT_MASK));
|
|
|
|
rmap_printk("kvm_rmap_unmap_hva: spte %p %llx\n", sptep, *sptep);
|
|
|
|
|
|
|
|
drop_spte(kvm, sptep);
|
2008-07-25 22:24:52 +08:00
|
|
|
need_tlb_flush = 1;
|
|
|
|
}
|
2012-03-21 22:50:34 +08:00
|
|
|
|
2008-07-25 22:24:52 +08:00
|
|
|
return need_tlb_flush;
|
|
|
|
}
|
|
|
|
|
2009-10-09 19:42:56 +08:00
|
|
|
static int kvm_set_pte_rmapp(struct kvm *kvm, unsigned long *rmapp,
|
2012-07-02 16:57:59 +08:00
|
|
|
struct kvm_memory_slot *slot, unsigned long data)
|
2009-09-24 02:47:18 +08:00
|
|
|
{
|
2012-03-21 22:50:34 +08:00
|
|
|
u64 *sptep;
|
|
|
|
struct rmap_iterator iter;
|
2009-09-24 02:47:18 +08:00
|
|
|
int need_flush = 0;
|
2012-03-21 22:50:34 +08:00
|
|
|
u64 new_spte;
|
2009-09-24 02:47:18 +08:00
|
|
|
pte_t *ptep = (pte_t *)data;
|
|
|
|
pfn_t new_pfn;
|
|
|
|
|
|
|
|
WARN_ON(pte_huge(*ptep));
|
|
|
|
new_pfn = pte_pfn(*ptep);
|
2012-03-21 22:50:34 +08:00
|
|
|
|
|
|
|
for (sptep = rmap_get_first(*rmapp, &iter); sptep;) {
|
|
|
|
BUG_ON(!is_shadow_present_pte(*sptep));
|
|
|
|
rmap_printk("kvm_set_pte_rmapp: spte %p %llx\n", sptep, *sptep);
|
|
|
|
|
2009-09-24 02:47:18 +08:00
|
|
|
need_flush = 1;
|
2012-03-21 22:50:34 +08:00
|
|
|
|
2009-09-24 02:47:18 +08:00
|
|
|
if (pte_write(*ptep)) {
|
2012-03-21 22:50:34 +08:00
|
|
|
drop_spte(kvm, sptep);
|
|
|
|
sptep = rmap_get_first(*rmapp, &iter);
|
2009-09-24 02:47:18 +08:00
|
|
|
} else {
|
2012-03-21 22:50:34 +08:00
|
|
|
new_spte = *sptep & ~PT64_BASE_ADDR_MASK;
|
2009-09-24 02:47:18 +08:00
|
|
|
new_spte |= (u64)new_pfn << PAGE_SHIFT;
|
|
|
|
|
|
|
|
new_spte &= ~PT_WRITABLE_MASK;
|
|
|
|
new_spte &= ~SPTE_HOST_WRITEABLE;
|
2010-06-06 20:46:44 +08:00
|
|
|
new_spte &= ~shadow_accessed_mask;
|
2012-03-21 22:50:34 +08:00
|
|
|
|
|
|
|
mmu_spte_clear_track_bits(sptep);
|
|
|
|
mmu_spte_set(sptep, new_spte);
|
|
|
|
sptep = rmap_get_next(&iter);
|
2009-09-24 02:47:18 +08:00
|
|
|
}
|
|
|
|
}
|
2012-03-21 22:50:34 +08:00
|
|
|
|
2009-09-24 02:47:18 +08:00
|
|
|
if (need_flush)
|
|
|
|
kvm_flush_remote_tlbs(kvm);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
KVM: MMU: Make kvm_handle_hva() handle range of addresses
When guest's memory is backed by THP pages, MMU notifier needs to call
kvm_unmap_hva(), which in turn leads to kvm_handle_hva(), in a loop to
invalidate a range of pages which constitute one huge page:
for each page
for each memslot
if page is in memslot
unmap using rmap
This means although every page in that range is expected to be found in
the same memslot, we are forced to check unrelated memslots many times.
If the guest has more memslots, the situation will become worse.
Furthermore, if the range does not include any pages in the guest's
memory, the loop over the pages will just consume extra time.
This patch, together with the following patches, solves this problem by
introducing kvm_handle_hva_range() which makes the loop look like this:
for each memslot
for each page in memslot
unmap using rmap
In this new processing, the actual work is converted to a loop over rmap
which is much more cache friendly than before.
Signed-off-by: Takuya Yoshikawa <yoshikawa.takuya@oss.ntt.co.jp>
Cc: Alexander Graf <agraf@suse.de>
Cc: Paul Mackerras <paulus@samba.org>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2012-07-02 16:55:48 +08:00
|
|
|
static int kvm_handle_hva_range(struct kvm *kvm,
|
|
|
|
unsigned long start,
|
|
|
|
unsigned long end,
|
|
|
|
unsigned long data,
|
|
|
|
int (*handler)(struct kvm *kvm,
|
|
|
|
unsigned long *rmapp,
|
2012-07-02 16:57:59 +08:00
|
|
|
struct kvm_memory_slot *slot,
|
KVM: MMU: Make kvm_handle_hva() handle range of addresses
When guest's memory is backed by THP pages, MMU notifier needs to call
kvm_unmap_hva(), which in turn leads to kvm_handle_hva(), in a loop to
invalidate a range of pages which constitute one huge page:
for each page
for each memslot
if page is in memslot
unmap using rmap
This means although every page in that range is expected to be found in
the same memslot, we are forced to check unrelated memslots many times.
If the guest has more memslots, the situation will become worse.
Furthermore, if the range does not include any pages in the guest's
memory, the loop over the pages will just consume extra time.
This patch, together with the following patches, solves this problem by
introducing kvm_handle_hva_range() which makes the loop look like this:
for each memslot
for each page in memslot
unmap using rmap
In this new processing, the actual work is converted to a loop over rmap
which is much more cache friendly than before.
Signed-off-by: Takuya Yoshikawa <yoshikawa.takuya@oss.ntt.co.jp>
Cc: Alexander Graf <agraf@suse.de>
Cc: Paul Mackerras <paulus@samba.org>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2012-07-02 16:55:48 +08:00
|
|
|
unsigned long data))
|
2008-07-25 22:24:52 +08:00
|
|
|
{
|
2011-11-24 17:39:18 +08:00
|
|
|
int j;
|
2012-07-02 16:58:48 +08:00
|
|
|
int ret = 0;
|
2009-12-24 00:35:21 +08:00
|
|
|
struct kvm_memslots *slots;
|
2011-11-24 17:39:18 +08:00
|
|
|
struct kvm_memory_slot *memslot;
|
2009-12-24 00:35:21 +08:00
|
|
|
|
2010-04-19 17:41:23 +08:00
|
|
|
slots = kvm_memslots(kvm);
|
2008-07-25 22:24:52 +08:00
|
|
|
|
2011-11-24 17:39:18 +08:00
|
|
|
kvm_for_each_memslot(memslot, slots) {
|
KVM: MMU: Make kvm_handle_hva() handle range of addresses
When guest's memory is backed by THP pages, MMU notifier needs to call
kvm_unmap_hva(), which in turn leads to kvm_handle_hva(), in a loop to
invalidate a range of pages which constitute one huge page:
for each page
for each memslot
if page is in memslot
unmap using rmap
This means although every page in that range is expected to be found in
the same memslot, we are forced to check unrelated memslots many times.
If the guest has more memslots, the situation will become worse.
Furthermore, if the range does not include any pages in the guest's
memory, the loop over the pages will just consume extra time.
This patch, together with the following patches, solves this problem by
introducing kvm_handle_hva_range() which makes the loop look like this:
for each memslot
for each page in memslot
unmap using rmap
In this new processing, the actual work is converted to a loop over rmap
which is much more cache friendly than before.
Signed-off-by: Takuya Yoshikawa <yoshikawa.takuya@oss.ntt.co.jp>
Cc: Alexander Graf <agraf@suse.de>
Cc: Paul Mackerras <paulus@samba.org>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2012-07-02 16:55:48 +08:00
|
|
|
unsigned long hva_start, hva_end;
|
2012-07-02 16:59:33 +08:00
|
|
|
gfn_t gfn_start, gfn_end;
|
2008-07-25 22:24:52 +08:00
|
|
|
|
KVM: MMU: Make kvm_handle_hva() handle range of addresses
When guest's memory is backed by THP pages, MMU notifier needs to call
kvm_unmap_hva(), which in turn leads to kvm_handle_hva(), in a loop to
invalidate a range of pages which constitute one huge page:
for each page
for each memslot
if page is in memslot
unmap using rmap
This means although every page in that range is expected to be found in
the same memslot, we are forced to check unrelated memslots many times.
If the guest has more memslots, the situation will become worse.
Furthermore, if the range does not include any pages in the guest's
memory, the loop over the pages will just consume extra time.
This patch, together with the following patches, solves this problem by
introducing kvm_handle_hva_range() which makes the loop look like this:
for each memslot
for each page in memslot
unmap using rmap
In this new processing, the actual work is converted to a loop over rmap
which is much more cache friendly than before.
Signed-off-by: Takuya Yoshikawa <yoshikawa.takuya@oss.ntt.co.jp>
Cc: Alexander Graf <agraf@suse.de>
Cc: Paul Mackerras <paulus@samba.org>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2012-07-02 16:55:48 +08:00
|
|
|
hva_start = max(start, memslot->userspace_addr);
|
|
|
|
hva_end = min(end, memslot->userspace_addr +
|
|
|
|
(memslot->npages << PAGE_SHIFT));
|
|
|
|
if (hva_start >= hva_end)
|
|
|
|
continue;
|
|
|
|
/*
|
|
|
|
* {gfn(page) | page intersects with [hva_start, hva_end)} =
|
2012-07-02 16:59:33 +08:00
|
|
|
* {gfn_start, gfn_start+1, ..., gfn_end-1}.
|
KVM: MMU: Make kvm_handle_hva() handle range of addresses
When guest's memory is backed by THP pages, MMU notifier needs to call
kvm_unmap_hva(), which in turn leads to kvm_handle_hva(), in a loop to
invalidate a range of pages which constitute one huge page:
for each page
for each memslot
if page is in memslot
unmap using rmap
This means although every page in that range is expected to be found in
the same memslot, we are forced to check unrelated memslots many times.
If the guest has more memslots, the situation will become worse.
Furthermore, if the range does not include any pages in the guest's
memory, the loop over the pages will just consume extra time.
This patch, together with the following patches, solves this problem by
introducing kvm_handle_hva_range() which makes the loop look like this:
for each memslot
for each page in memslot
unmap using rmap
In this new processing, the actual work is converted to a loop over rmap
which is much more cache friendly than before.
Signed-off-by: Takuya Yoshikawa <yoshikawa.takuya@oss.ntt.co.jp>
Cc: Alexander Graf <agraf@suse.de>
Cc: Paul Mackerras <paulus@samba.org>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2012-07-02 16:55:48 +08:00
|
|
|
*/
|
2012-07-02 16:59:33 +08:00
|
|
|
gfn_start = hva_to_gfn_memslot(hva_start, memslot);
|
KVM: MMU: Make kvm_handle_hva() handle range of addresses
When guest's memory is backed by THP pages, MMU notifier needs to call
kvm_unmap_hva(), which in turn leads to kvm_handle_hva(), in a loop to
invalidate a range of pages which constitute one huge page:
for each page
for each memslot
if page is in memslot
unmap using rmap
This means although every page in that range is expected to be found in
the same memslot, we are forced to check unrelated memslots many times.
If the guest has more memslots, the situation will become worse.
Furthermore, if the range does not include any pages in the guest's
memory, the loop over the pages will just consume extra time.
This patch, together with the following patches, solves this problem by
introducing kvm_handle_hva_range() which makes the loop look like this:
for each memslot
for each page in memslot
unmap using rmap
In this new processing, the actual work is converted to a loop over rmap
which is much more cache friendly than before.
Signed-off-by: Takuya Yoshikawa <yoshikawa.takuya@oss.ntt.co.jp>
Cc: Alexander Graf <agraf@suse.de>
Cc: Paul Mackerras <paulus@samba.org>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2012-07-02 16:55:48 +08:00
|
|
|
gfn_end = hva_to_gfn_memslot(hva_end + PAGE_SIZE - 1, memslot);
|
2009-07-27 22:30:44 +08:00
|
|
|
|
2012-07-02 16:59:33 +08:00
|
|
|
for (j = PT_PAGE_TABLE_LEVEL;
|
|
|
|
j < PT_PAGE_TABLE_LEVEL + KVM_NR_PAGE_SIZES; ++j) {
|
|
|
|
unsigned long idx, idx_end;
|
|
|
|
unsigned long *rmapp;
|
2010-12-07 11:59:07 +08:00
|
|
|
|
2012-07-02 16:59:33 +08:00
|
|
|
/*
|
|
|
|
* {idx(page_j) | page_j intersects with
|
|
|
|
* [hva_start, hva_end)} = {idx, idx+1, ..., idx_end}.
|
|
|
|
*/
|
|
|
|
idx = gfn_to_index(gfn_start, memslot->base_gfn, j);
|
|
|
|
idx_end = gfn_to_index(gfn_end - 1, memslot->base_gfn, j);
|
2009-07-27 22:30:44 +08:00
|
|
|
|
2012-07-02 16:59:33 +08:00
|
|
|
rmapp = __gfn_to_rmap(gfn_start, j, memslot);
|
2010-12-07 11:59:07 +08:00
|
|
|
|
2012-07-02 16:59:33 +08:00
|
|
|
for (; idx <= idx_end; ++idx)
|
|
|
|
ret |= handler(kvm, rmapp++, memslot, data);
|
2008-07-25 22:24:52 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-07-02 16:58:48 +08:00
|
|
|
return ret;
|
2008-07-25 22:24:52 +08:00
|
|
|
}
|
|
|
|
|
KVM: MMU: Make kvm_handle_hva() handle range of addresses
When guest's memory is backed by THP pages, MMU notifier needs to call
kvm_unmap_hva(), which in turn leads to kvm_handle_hva(), in a loop to
invalidate a range of pages which constitute one huge page:
for each page
for each memslot
if page is in memslot
unmap using rmap
This means although every page in that range is expected to be found in
the same memslot, we are forced to check unrelated memslots many times.
If the guest has more memslots, the situation will become worse.
Furthermore, if the range does not include any pages in the guest's
memory, the loop over the pages will just consume extra time.
This patch, together with the following patches, solves this problem by
introducing kvm_handle_hva_range() which makes the loop look like this:
for each memslot
for each page in memslot
unmap using rmap
In this new processing, the actual work is converted to a loop over rmap
which is much more cache friendly than before.
Signed-off-by: Takuya Yoshikawa <yoshikawa.takuya@oss.ntt.co.jp>
Cc: Alexander Graf <agraf@suse.de>
Cc: Paul Mackerras <paulus@samba.org>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2012-07-02 16:55:48 +08:00
|
|
|
static int kvm_handle_hva(struct kvm *kvm, unsigned long hva,
|
|
|
|
unsigned long data,
|
|
|
|
int (*handler)(struct kvm *kvm, unsigned long *rmapp,
|
2012-07-02 16:57:59 +08:00
|
|
|
struct kvm_memory_slot *slot,
|
KVM: MMU: Make kvm_handle_hva() handle range of addresses
When guest's memory is backed by THP pages, MMU notifier needs to call
kvm_unmap_hva(), which in turn leads to kvm_handle_hva(), in a loop to
invalidate a range of pages which constitute one huge page:
for each page
for each memslot
if page is in memslot
unmap using rmap
This means although every page in that range is expected to be found in
the same memslot, we are forced to check unrelated memslots many times.
If the guest has more memslots, the situation will become worse.
Furthermore, if the range does not include any pages in the guest's
memory, the loop over the pages will just consume extra time.
This patch, together with the following patches, solves this problem by
introducing kvm_handle_hva_range() which makes the loop look like this:
for each memslot
for each page in memslot
unmap using rmap
In this new processing, the actual work is converted to a loop over rmap
which is much more cache friendly than before.
Signed-off-by: Takuya Yoshikawa <yoshikawa.takuya@oss.ntt.co.jp>
Cc: Alexander Graf <agraf@suse.de>
Cc: Paul Mackerras <paulus@samba.org>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2012-07-02 16:55:48 +08:00
|
|
|
unsigned long data))
|
|
|
|
{
|
|
|
|
return kvm_handle_hva_range(kvm, hva, hva + 1, data, handler);
|
2008-07-25 22:24:52 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_unmap_hva(struct kvm *kvm, unsigned long hva)
|
|
|
|
{
|
2009-09-24 02:47:18 +08:00
|
|
|
return kvm_handle_hva(kvm, hva, 0, kvm_unmap_rmapp);
|
|
|
|
}
|
|
|
|
|
2012-07-02 16:56:33 +08:00
|
|
|
int kvm_unmap_hva_range(struct kvm *kvm, unsigned long start, unsigned long end)
|
|
|
|
{
|
|
|
|
return kvm_handle_hva_range(kvm, start, end, 0, kvm_unmap_rmapp);
|
|
|
|
}
|
|
|
|
|
2009-09-24 02:47:18 +08:00
|
|
|
void kvm_set_spte_hva(struct kvm *kvm, unsigned long hva, pte_t pte)
|
|
|
|
{
|
2009-10-09 19:42:56 +08:00
|
|
|
kvm_handle_hva(kvm, hva, (unsigned long)&pte, kvm_set_pte_rmapp);
|
2008-07-25 22:24:52 +08:00
|
|
|
}
|
|
|
|
|
2009-10-09 19:42:56 +08:00
|
|
|
static int kvm_age_rmapp(struct kvm *kvm, unsigned long *rmapp,
|
2012-07-02 16:57:59 +08:00
|
|
|
struct kvm_memory_slot *slot, unsigned long data)
|
2008-07-25 22:24:52 +08:00
|
|
|
{
|
2012-03-21 22:50:34 +08:00
|
|
|
u64 *sptep;
|
2012-06-03 16:34:08 +08:00
|
|
|
struct rmap_iterator uninitialized_var(iter);
|
2008-07-25 22:24:52 +08:00
|
|
|
int young = 0;
|
|
|
|
|
2010-02-04 05:11:03 +08:00
|
|
|
/*
|
2012-05-22 11:23:15 +08:00
|
|
|
* In case of absence of EPT Access and Dirty Bits supports,
|
|
|
|
* emulate the accessed bit for EPT, by checking if this page has
|
2010-02-04 05:11:03 +08:00
|
|
|
* an EPT mapping, and clearing it if it does. On the next access,
|
|
|
|
* a new EPT mapping will be established.
|
|
|
|
* This has some overhead, but not as much as the cost of swapping
|
|
|
|
* out actively used pages or breaking up actively used hugepages.
|
|
|
|
*/
|
2012-07-02 16:58:48 +08:00
|
|
|
if (!shadow_accessed_mask) {
|
|
|
|
young = kvm_unmap_rmapp(kvm, rmapp, slot, data);
|
|
|
|
goto out;
|
|
|
|
}
|
2008-09-08 15:12:30 +08:00
|
|
|
|
2012-03-21 22:50:34 +08:00
|
|
|
for (sptep = rmap_get_first(*rmapp, &iter); sptep;
|
|
|
|
sptep = rmap_get_next(&iter)) {
|
2012-05-22 11:23:15 +08:00
|
|
|
BUG_ON(!is_shadow_present_pte(*sptep));
|
2012-03-21 22:50:34 +08:00
|
|
|
|
2012-05-22 11:23:15 +08:00
|
|
|
if (*sptep & shadow_accessed_mask) {
|
2008-07-25 22:24:52 +08:00
|
|
|
young = 1;
|
2012-05-22 11:23:15 +08:00
|
|
|
clear_bit((ffs(shadow_accessed_mask) - 1),
|
|
|
|
(unsigned long *)sptep);
|
2008-07-25 22:24:52 +08:00
|
|
|
}
|
|
|
|
}
|
2012-07-02 16:58:48 +08:00
|
|
|
out:
|
|
|
|
/* @data has hva passed to kvm_age_hva(). */
|
|
|
|
trace_kvm_age_page(data, slot, young);
|
2008-07-25 22:24:52 +08:00
|
|
|
return young;
|
|
|
|
}
|
|
|
|
|
2011-01-14 07:47:10 +08:00
|
|
|
static int kvm_test_age_rmapp(struct kvm *kvm, unsigned long *rmapp,
|
2012-07-02 16:57:59 +08:00
|
|
|
struct kvm_memory_slot *slot, unsigned long data)
|
2011-01-14 07:47:10 +08:00
|
|
|
{
|
2012-03-21 22:50:34 +08:00
|
|
|
u64 *sptep;
|
|
|
|
struct rmap_iterator iter;
|
2011-01-14 07:47:10 +08:00
|
|
|
int young = 0;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If there's no access bit in the secondary pte set by the
|
|
|
|
* hardware it's up to gup-fast/gup to set the access bit in
|
|
|
|
* the primary pte or in the page structure.
|
|
|
|
*/
|
|
|
|
if (!shadow_accessed_mask)
|
|
|
|
goto out;
|
|
|
|
|
2012-03-21 22:50:34 +08:00
|
|
|
for (sptep = rmap_get_first(*rmapp, &iter); sptep;
|
|
|
|
sptep = rmap_get_next(&iter)) {
|
2012-05-22 11:23:15 +08:00
|
|
|
BUG_ON(!is_shadow_present_pte(*sptep));
|
2012-03-21 22:50:34 +08:00
|
|
|
|
2012-05-22 11:23:15 +08:00
|
|
|
if (*sptep & shadow_accessed_mask) {
|
2011-01-14 07:47:10 +08:00
|
|
|
young = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
return young;
|
|
|
|
}
|
|
|
|
|
2009-08-06 02:43:58 +08:00
|
|
|
#define RMAP_RECYCLE_THRESHOLD 1000
|
|
|
|
|
2009-07-27 22:30:44 +08:00
|
|
|
static void rmap_recycle(struct kvm_vcpu *vcpu, u64 *spte, gfn_t gfn)
|
2009-08-06 02:43:58 +08:00
|
|
|
{
|
|
|
|
unsigned long *rmapp;
|
2009-07-27 22:30:44 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
|
|
|
|
sp = page_header(__pa(spte));
|
2009-08-06 02:43:58 +08:00
|
|
|
|
2009-07-27 22:30:44 +08:00
|
|
|
rmapp = gfn_to_rmap(vcpu->kvm, gfn, sp->role.level);
|
2009-08-06 02:43:58 +08:00
|
|
|
|
2012-07-02 16:57:59 +08:00
|
|
|
kvm_unmap_rmapp(vcpu->kvm, rmapp, NULL, 0);
|
2009-08-06 02:43:58 +08:00
|
|
|
kvm_flush_remote_tlbs(vcpu->kvm);
|
|
|
|
}
|
|
|
|
|
2008-07-25 22:24:52 +08:00
|
|
|
int kvm_age_hva(struct kvm *kvm, unsigned long hva)
|
|
|
|
{
|
2012-07-02 16:58:48 +08:00
|
|
|
return kvm_handle_hva(kvm, hva, hva, kvm_age_rmapp);
|
2008-07-25 22:24:52 +08:00
|
|
|
}
|
|
|
|
|
2011-01-14 07:47:10 +08:00
|
|
|
int kvm_test_age_hva(struct kvm *kvm, unsigned long hva)
|
|
|
|
{
|
|
|
|
return kvm_handle_hva(kvm, hva, 0, kvm_test_age_rmapp);
|
|
|
|
}
|
|
|
|
|
2007-04-25 14:17:25 +08:00
|
|
|
#ifdef MMU_DEBUG
|
2007-05-06 20:50:58 +08:00
|
|
|
static int is_empty_shadow_page(u64 *spt)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2007-01-06 08:36:50 +08:00
|
|
|
u64 *pos;
|
|
|
|
u64 *end;
|
|
|
|
|
2007-05-06 20:50:58 +08:00
|
|
|
for (pos = spt, end = pos + PAGE_SIZE / sizeof(u64); pos != end; pos++)
|
2008-05-20 21:21:13 +08:00
|
|
|
if (is_shadow_present_pte(*pos)) {
|
2008-03-04 04:59:56 +08:00
|
|
|
printk(KERN_ERR "%s: %p %llx\n", __func__,
|
2007-01-06 08:36:50 +08:00
|
|
|
pos, *pos);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
return 0;
|
2007-01-06 08:36:50 +08:00
|
|
|
}
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
return 1;
|
|
|
|
}
|
2007-04-25 14:17:25 +08:00
|
|
|
#endif
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
KVM: create aggregate kvm_total_used_mmu_pages value
Of slab shrinkers, the VM code says:
* Note that 'shrink' will be passed nr_to_scan == 0 when the VM is
* querying the cache size, so a fastpath for that case is appropriate.
and it *means* it. Look at how it calls the shrinkers:
nr_before = (*shrinker->shrink)(0, gfp_mask);
shrink_ret = (*shrinker->shrink)(this_scan, gfp_mask);
So, if you do anything stupid in your shrinker, the VM will doubly
punish you.
The mmu_shrink() function takes the global kvm_lock, then acquires
every VM's kvm->mmu_lock in sequence. If we have 100 VMs, then
we're going to take 101 locks. We do it twice, so each call takes
202 locks. If we're under memory pressure, we can have each cpu
trying to do this. It can get really hairy, and we've seen lock
spinning in mmu_shrink() be the dominant entry in profiles.
This is guaranteed to optimize at least half of those lock
aquisitions away. It removes the need to take any of the locks
when simply trying to count objects.
A 'percpu_counter' can be a large object, but we only have one
of these for the entire system. There are not any better
alternatives at the moment, especially ones that handle CPU
hotplug.
Signed-off-by: Dave Hansen <dave@linux.vnet.ibm.com>
Signed-off-by: Tim Pepper <lnxninja@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2010-08-20 09:11:37 +08:00
|
|
|
/*
|
|
|
|
* This value is the sum of all of the kvm instances's
|
|
|
|
* kvm->arch.n_used_mmu_pages values. We need a global,
|
|
|
|
* aggregate version in order to make the slab shrinker
|
|
|
|
* faster
|
|
|
|
*/
|
|
|
|
static inline void kvm_mod_used_mmu_pages(struct kvm *kvm, int nr)
|
|
|
|
{
|
|
|
|
kvm->arch.n_used_mmu_pages += nr;
|
|
|
|
percpu_counter_add(&kvm_total_used_mmu_pages, nr);
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:27:14 +08:00
|
|
|
/*
|
|
|
|
* Remove the sp from shadow page cache, after call it,
|
|
|
|
* we can not find this sp from the cache, and the shadow
|
|
|
|
* page table is still valid.
|
|
|
|
* It should be under the protection of mmu lock.
|
|
|
|
*/
|
|
|
|
static void kvm_mmu_isolate_page(struct kvm_mmu_page *sp)
|
2007-01-06 08:36:49 +08:00
|
|
|
{
|
2007-11-21 21:28:32 +08:00
|
|
|
ASSERT(is_empty_shadow_page(sp->spt));
|
2010-06-04 21:53:54 +08:00
|
|
|
hlist_del(&sp->hash_link);
|
2010-05-26 16:49:59 +08:00
|
|
|
if (!sp->role.direct)
|
2011-03-04 19:01:10 +08:00
|
|
|
free_page((unsigned long)sp->gfns);
|
2011-07-12 03:27:14 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Free the shadow page table and the sp, we can do it
|
|
|
|
* out of the protection of mmu lock.
|
|
|
|
*/
|
|
|
|
static void kvm_mmu_free_page(struct kvm_mmu_page *sp)
|
|
|
|
{
|
|
|
|
list_del(&sp->link);
|
|
|
|
free_page((unsigned long)sp->spt);
|
2010-05-13 10:06:02 +08:00
|
|
|
kmem_cache_free(mmu_page_header_cache, sp);
|
2007-01-06 08:36:49 +08:00
|
|
|
}
|
|
|
|
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
static unsigned kvm_page_table_hashfn(gfn_t gfn)
|
|
|
|
{
|
2008-01-07 19:20:25 +08:00
|
|
|
return gfn & ((1 << KVM_MMU_HASH_SHIFT) - 1);
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
}
|
|
|
|
|
2007-01-06 08:36:53 +08:00
|
|
|
static void mmu_page_add_parent_pte(struct kvm_vcpu *vcpu,
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page *sp, u64 *parent_pte)
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
{
|
|
|
|
if (!parent_pte)
|
|
|
|
return;
|
|
|
|
|
2011-05-15 23:27:08 +08:00
|
|
|
pte_list_add(vcpu, parent_pte, &sp->parent_ptes);
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
}
|
|
|
|
|
2007-11-21 21:28:32 +08:00
|
|
|
static void mmu_page_remove_parent_pte(struct kvm_mmu_page *sp,
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
u64 *parent_pte)
|
|
|
|
{
|
2011-05-15 23:27:08 +08:00
|
|
|
pte_list_remove(parent_pte, &sp->parent_ptes);
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
}
|
|
|
|
|
2011-05-15 23:28:29 +08:00
|
|
|
static void drop_parent_pte(struct kvm_mmu_page *sp,
|
|
|
|
u64 *parent_pte)
|
|
|
|
{
|
|
|
|
mmu_page_remove_parent_pte(sp, parent_pte);
|
2011-07-12 03:30:35 +08:00
|
|
|
mmu_spte_clear_no_track(parent_pte);
|
2011-05-15 23:28:29 +08:00
|
|
|
}
|
|
|
|
|
2011-05-15 23:27:08 +08:00
|
|
|
static struct kvm_mmu_page *kvm_mmu_alloc_page(struct kvm_vcpu *vcpu,
|
|
|
|
u64 *parent_pte, int direct)
|
2008-09-24 00:18:36 +08:00
|
|
|
{
|
2011-05-15 23:27:08 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
2012-05-29 22:54:26 +08:00
|
|
|
sp = mmu_memory_cache_alloc(&vcpu->arch.mmu_page_header_cache);
|
|
|
|
sp->spt = mmu_memory_cache_alloc(&vcpu->arch.mmu_page_cache);
|
2011-05-15 23:27:08 +08:00
|
|
|
if (!direct)
|
2012-05-29 22:54:26 +08:00
|
|
|
sp->gfns = mmu_memory_cache_alloc(&vcpu->arch.mmu_page_cache);
|
2011-05-15 23:27:08 +08:00
|
|
|
set_page_private(virt_to_page(sp->spt), (unsigned long)sp);
|
|
|
|
list_add(&sp->link, &vcpu->kvm->arch.active_mmu_pages);
|
2011-11-24 17:37:48 +08:00
|
|
|
bitmap_zero(sp->slot_bitmap, KVM_MEM_SLOTS_NUM);
|
2011-05-15 23:27:08 +08:00
|
|
|
sp->parent_ptes = 0;
|
|
|
|
mmu_page_add_parent_pte(vcpu, sp, parent_pte);
|
|
|
|
kvm_mod_used_mmu_pages(vcpu->kvm, +1);
|
|
|
|
return sp;
|
2008-09-24 00:18:36 +08:00
|
|
|
}
|
|
|
|
|
2011-05-15 23:27:08 +08:00
|
|
|
static void mark_unsync(u64 *spte);
|
2010-06-11 21:35:15 +08:00
|
|
|
static void kvm_mmu_mark_parents_unsync(struct kvm_mmu_page *sp)
|
2008-09-24 00:18:40 +08:00
|
|
|
{
|
2011-05-15 23:27:08 +08:00
|
|
|
pte_list_walk(&sp->parent_ptes, mark_unsync);
|
2008-09-24 00:18:40 +08:00
|
|
|
}
|
|
|
|
|
2011-05-15 23:27:08 +08:00
|
|
|
static void mark_unsync(u64 *spte)
|
2008-09-24 00:18:40 +08:00
|
|
|
{
|
2011-05-15 23:27:08 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
2010-06-11 21:35:15 +08:00
|
|
|
unsigned int index;
|
2008-09-24 00:18:40 +08:00
|
|
|
|
2011-05-15 23:27:08 +08:00
|
|
|
sp = page_header(__pa(spte));
|
2010-06-11 21:35:15 +08:00
|
|
|
index = spte - sp->spt;
|
|
|
|
if (__test_and_set_bit(index, sp->unsync_child_bitmap))
|
2008-09-24 00:18:40 +08:00
|
|
|
return;
|
2010-06-11 21:35:15 +08:00
|
|
|
if (sp->unsync_children++)
|
2008-09-24 00:18:40 +08:00
|
|
|
return;
|
2010-06-11 21:35:15 +08:00
|
|
|
kvm_mmu_mark_parents_unsync(sp);
|
2008-09-24 00:18:40 +08:00
|
|
|
}
|
|
|
|
|
2008-09-24 00:18:33 +08:00
|
|
|
static int nonpaging_sync_page(struct kvm_vcpu *vcpu,
|
2010-11-19 17:04:03 +08:00
|
|
|
struct kvm_mmu_page *sp)
|
2008-09-24 00:18:33 +08:00
|
|
|
{
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2008-09-24 00:18:35 +08:00
|
|
|
static void nonpaging_invlpg(struct kvm_vcpu *vcpu, gva_t gva)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2011-03-09 15:43:51 +08:00
|
|
|
static void nonpaging_update_pte(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu_page *sp, u64 *spte,
|
2011-03-28 10:29:27 +08:00
|
|
|
const void *pte)
|
2011-03-09 15:43:51 +08:00
|
|
|
{
|
|
|
|
WARN_ON(1);
|
|
|
|
}
|
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
#define KVM_PAGE_ARRAY_NR 16
|
|
|
|
|
|
|
|
struct kvm_mmu_pages {
|
|
|
|
struct mmu_page_and_offset {
|
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
unsigned int idx;
|
|
|
|
} page[KVM_PAGE_ARRAY_NR];
|
|
|
|
unsigned int nr;
|
|
|
|
};
|
|
|
|
|
2009-02-21 09:19:13 +08:00
|
|
|
static int mmu_pages_add(struct kvm_mmu_pages *pvec, struct kvm_mmu_page *sp,
|
|
|
|
int idx)
|
2008-09-24 00:18:39 +08:00
|
|
|
{
|
2008-12-02 08:32:02 +08:00
|
|
|
int i;
|
2008-09-24 00:18:39 +08:00
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
if (sp->unsync)
|
|
|
|
for (i=0; i < pvec->nr; i++)
|
|
|
|
if (pvec->page[i].sp == sp)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
pvec->page[pvec->nr].sp = sp;
|
|
|
|
pvec->page[pvec->nr].idx = idx;
|
|
|
|
pvec->nr++;
|
|
|
|
return (pvec->nr == KVM_PAGE_ARRAY_NR);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int __mmu_unsync_walk(struct kvm_mmu_page *sp,
|
|
|
|
struct kvm_mmu_pages *pvec)
|
|
|
|
{
|
|
|
|
int i, ret, nr_unsync_leaf = 0;
|
2008-09-24 00:18:39 +08:00
|
|
|
|
2011-11-29 13:02:45 +08:00
|
|
|
for_each_set_bit(i, sp->unsync_child_bitmap, 512) {
|
2010-06-11 21:34:04 +08:00
|
|
|
struct kvm_mmu_page *child;
|
2008-09-24 00:18:39 +08:00
|
|
|
u64 ent = sp->spt[i];
|
|
|
|
|
2010-06-11 21:34:04 +08:00
|
|
|
if (!is_shadow_present_pte(ent) || is_large_pte(ent))
|
|
|
|
goto clear_child_bitmap;
|
|
|
|
|
|
|
|
child = page_header(ent & PT64_BASE_ADDR_MASK);
|
|
|
|
|
|
|
|
if (child->unsync_children) {
|
|
|
|
if (mmu_pages_add(pvec, child, i))
|
|
|
|
return -ENOSPC;
|
|
|
|
|
|
|
|
ret = __mmu_unsync_walk(child, pvec);
|
|
|
|
if (!ret)
|
|
|
|
goto clear_child_bitmap;
|
|
|
|
else if (ret > 0)
|
|
|
|
nr_unsync_leaf += ret;
|
|
|
|
else
|
|
|
|
return ret;
|
|
|
|
} else if (child->unsync) {
|
|
|
|
nr_unsync_leaf++;
|
|
|
|
if (mmu_pages_add(pvec, child, i))
|
|
|
|
return -ENOSPC;
|
|
|
|
} else
|
|
|
|
goto clear_child_bitmap;
|
|
|
|
|
|
|
|
continue;
|
|
|
|
|
|
|
|
clear_child_bitmap:
|
|
|
|
__clear_bit(i, sp->unsync_child_bitmap);
|
|
|
|
sp->unsync_children--;
|
|
|
|
WARN_ON((int)sp->unsync_children < 0);
|
2008-09-24 00:18:39 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
return nr_unsync_leaf;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int mmu_unsync_walk(struct kvm_mmu_page *sp,
|
|
|
|
struct kvm_mmu_pages *pvec)
|
|
|
|
{
|
|
|
|
if (!sp->unsync_children)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
mmu_pages_add(pvec, sp, 0);
|
|
|
|
return __mmu_unsync_walk(sp, pvec);
|
2008-09-24 00:18:39 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void kvm_unlink_unsync_page(struct kvm *kvm, struct kvm_mmu_page *sp)
|
|
|
|
{
|
|
|
|
WARN_ON(!sp->unsync);
|
2010-04-28 11:55:06 +08:00
|
|
|
trace_kvm_mmu_sync_page(sp);
|
2008-09-24 00:18:39 +08:00
|
|
|
sp->unsync = 0;
|
|
|
|
--kvm->stat.mmu_unsync;
|
|
|
|
}
|
|
|
|
|
2010-06-04 21:53:54 +08:00
|
|
|
static int kvm_mmu_prepare_zap_page(struct kvm *kvm, struct kvm_mmu_page *sp,
|
|
|
|
struct list_head *invalid_list);
|
|
|
|
static void kvm_mmu_commit_zap_page(struct kvm *kvm,
|
|
|
|
struct list_head *invalid_list);
|
2008-09-24 00:18:39 +08:00
|
|
|
|
2010-06-04 21:56:11 +08:00
|
|
|
#define for_each_gfn_sp(kvm, sp, gfn, pos) \
|
|
|
|
hlist_for_each_entry(sp, pos, \
|
2010-06-04 21:53:07 +08:00
|
|
|
&(kvm)->arch.mmu_page_hash[kvm_page_table_hashfn(gfn)], hash_link) \
|
|
|
|
if ((sp)->gfn != (gfn)) {} else
|
|
|
|
|
2010-06-04 21:56:11 +08:00
|
|
|
#define for_each_gfn_indirect_valid_sp(kvm, sp, gfn, pos) \
|
|
|
|
hlist_for_each_entry(sp, pos, \
|
2010-06-04 21:53:07 +08:00
|
|
|
&(kvm)->arch.mmu_page_hash[kvm_page_table_hashfn(gfn)], hash_link) \
|
|
|
|
if ((sp)->gfn != (gfn) || (sp)->role.direct || \
|
|
|
|
(sp)->role.invalid) {} else
|
|
|
|
|
2010-06-11 21:30:36 +08:00
|
|
|
/* @sp->gfn should be write-protected at the call site */
|
2010-05-15 18:51:24 +08:00
|
|
|
static int __kvm_sync_page(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp,
|
2010-06-04 21:55:29 +08:00
|
|
|
struct list_head *invalid_list, bool clear_unsync)
|
2008-09-24 00:18:39 +08:00
|
|
|
{
|
2010-04-15 00:20:03 +08:00
|
|
|
if (sp->role.cr4_pae != !!is_pae(vcpu)) {
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_prepare_zap_page(vcpu->kvm, sp, invalid_list);
|
2008-09-24 00:18:39 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2010-06-11 21:30:36 +08:00
|
|
|
if (clear_unsync)
|
2010-05-15 18:51:24 +08:00
|
|
|
kvm_unlink_unsync_page(vcpu->kvm, sp);
|
|
|
|
|
2010-11-19 17:04:03 +08:00
|
|
|
if (vcpu->arch.mmu.sync_page(vcpu, sp)) {
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_prepare_zap_page(vcpu->kvm, sp, invalid_list);
|
2008-09-24 00:18:39 +08:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
kvm_mmu_flush_tlb(vcpu);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-05-15 18:51:24 +08:00
|
|
|
static int kvm_sync_page_transient(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu_page *sp)
|
|
|
|
{
|
2010-06-04 21:55:29 +08:00
|
|
|
LIST_HEAD(invalid_list);
|
2010-05-15 18:51:24 +08:00
|
|
|
int ret;
|
|
|
|
|
2010-06-04 21:55:29 +08:00
|
|
|
ret = __kvm_sync_page(vcpu, sp, &invalid_list, false);
|
2010-06-11 21:31:38 +08:00
|
|
|
if (ret)
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_commit_zap_page(vcpu->kvm, &invalid_list);
|
|
|
|
|
2010-05-15 18:51:24 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2011-11-30 17:43:24 +08:00
|
|
|
#ifdef CONFIG_KVM_MMU_AUDIT
|
|
|
|
#include "mmu_audit.c"
|
|
|
|
#else
|
|
|
|
static void kvm_mmu_audit(struct kvm_vcpu *vcpu, int point) { }
|
|
|
|
static void mmu_audit_disable(void) { }
|
|
|
|
#endif
|
|
|
|
|
2010-06-04 21:55:29 +08:00
|
|
|
static int kvm_sync_page(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp,
|
|
|
|
struct list_head *invalid_list)
|
2010-05-15 18:51:24 +08:00
|
|
|
{
|
2010-06-04 21:55:29 +08:00
|
|
|
return __kvm_sync_page(vcpu, sp, invalid_list, true);
|
2010-05-15 18:51:24 +08:00
|
|
|
}
|
|
|
|
|
2010-05-24 15:41:33 +08:00
|
|
|
/* @gfn should be write-protected at the call site */
|
|
|
|
static void kvm_sync_pages(struct kvm_vcpu *vcpu, gfn_t gfn)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *s;
|
2010-06-04 21:56:11 +08:00
|
|
|
struct hlist_node *node;
|
2010-06-04 21:55:29 +08:00
|
|
|
LIST_HEAD(invalid_list);
|
2010-05-24 15:41:33 +08:00
|
|
|
bool flush = false;
|
|
|
|
|
2010-06-04 21:56:11 +08:00
|
|
|
for_each_gfn_indirect_valid_sp(vcpu->kvm, s, gfn, node) {
|
2010-06-04 21:53:07 +08:00
|
|
|
if (!s->unsync)
|
2010-05-24 15:41:33 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
WARN_ON(s->role.level != PT_PAGE_TABLE_LEVEL);
|
2010-11-19 17:04:03 +08:00
|
|
|
kvm_unlink_unsync_page(vcpu->kvm, s);
|
2010-05-24 15:41:33 +08:00
|
|
|
if ((s->role.cr4_pae != !!is_pae(vcpu)) ||
|
2010-11-19 17:04:03 +08:00
|
|
|
(vcpu->arch.mmu.sync_page(vcpu, s))) {
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_prepare_zap_page(vcpu->kvm, s, &invalid_list);
|
2010-05-24 15:41:33 +08:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
flush = true;
|
|
|
|
}
|
|
|
|
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_commit_zap_page(vcpu->kvm, &invalid_list);
|
2010-05-24 15:41:33 +08:00
|
|
|
if (flush)
|
|
|
|
kvm_mmu_flush_tlb(vcpu);
|
|
|
|
}
|
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
struct mmu_page_path {
|
|
|
|
struct kvm_mmu_page *parent[PT64_ROOT_LEVEL-1];
|
|
|
|
unsigned int idx[PT64_ROOT_LEVEL-1];
|
2008-09-24 00:18:39 +08:00
|
|
|
};
|
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
#define for_each_sp(pvec, sp, parents, i) \
|
|
|
|
for (i = mmu_pages_next(&pvec, &parents, -1), \
|
|
|
|
sp = pvec.page[i].sp; \
|
|
|
|
i < pvec.nr && ({ sp = pvec.page[i].sp; 1;}); \
|
|
|
|
i = mmu_pages_next(&pvec, &parents, i))
|
|
|
|
|
2009-02-21 09:19:13 +08:00
|
|
|
static int mmu_pages_next(struct kvm_mmu_pages *pvec,
|
|
|
|
struct mmu_page_path *parents,
|
|
|
|
int i)
|
2008-12-02 08:32:02 +08:00
|
|
|
{
|
|
|
|
int n;
|
|
|
|
|
|
|
|
for (n = i+1; n < pvec->nr; n++) {
|
|
|
|
struct kvm_mmu_page *sp = pvec->page[n].sp;
|
|
|
|
|
|
|
|
if (sp->role.level == PT_PAGE_TABLE_LEVEL) {
|
|
|
|
parents->idx[0] = pvec->page[n].idx;
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
parents->parent[sp->role.level-2] = sp;
|
|
|
|
parents->idx[sp->role.level-1] = pvec->page[n].idx;
|
|
|
|
}
|
|
|
|
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
2009-02-21 09:19:13 +08:00
|
|
|
static void mmu_pages_clear_parents(struct mmu_page_path *parents)
|
2008-09-24 00:18:39 +08:00
|
|
|
{
|
2008-12-02 08:32:02 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
unsigned int level = 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
unsigned int idx = parents->idx[level];
|
2008-09-24 00:18:39 +08:00
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
sp = parents->parent[level];
|
|
|
|
if (!sp)
|
|
|
|
return;
|
|
|
|
|
|
|
|
--sp->unsync_children;
|
|
|
|
WARN_ON((int)sp->unsync_children < 0);
|
|
|
|
__clear_bit(idx, sp->unsync_child_bitmap);
|
|
|
|
level++;
|
|
|
|
} while (level < PT64_ROOT_LEVEL-1 && !sp->unsync_children);
|
2008-09-24 00:18:39 +08:00
|
|
|
}
|
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
static void kvm_mmu_pages_init(struct kvm_mmu_page *parent,
|
|
|
|
struct mmu_page_path *parents,
|
|
|
|
struct kvm_mmu_pages *pvec)
|
2008-09-24 00:18:39 +08:00
|
|
|
{
|
2008-12-02 08:32:02 +08:00
|
|
|
parents->parent[parent->role.level-1] = NULL;
|
|
|
|
pvec->nr = 0;
|
|
|
|
}
|
2008-09-24 00:18:39 +08:00
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
static void mmu_sync_children(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu_page *parent)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
struct mmu_page_path parents;
|
|
|
|
struct kvm_mmu_pages pages;
|
2010-06-04 21:55:29 +08:00
|
|
|
LIST_HEAD(invalid_list);
|
2008-12-02 08:32:02 +08:00
|
|
|
|
|
|
|
kvm_mmu_pages_init(parent, &parents, &pages);
|
|
|
|
while (mmu_unsync_walk(parent, &pages)) {
|
2012-06-20 15:56:53 +08:00
|
|
|
bool protected = false;
|
2008-12-02 08:32:03 +08:00
|
|
|
|
|
|
|
for_each_sp(pages, sp, parents, i)
|
|
|
|
protected |= rmap_write_protect(vcpu->kvm, sp->gfn);
|
|
|
|
|
|
|
|
if (protected)
|
|
|
|
kvm_flush_remote_tlbs(vcpu->kvm);
|
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
for_each_sp(pages, sp, parents, i) {
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_sync_page(vcpu, sp, &invalid_list);
|
2008-12-02 08:32:02 +08:00
|
|
|
mmu_pages_clear_parents(&parents);
|
|
|
|
}
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_commit_zap_page(vcpu->kvm, &invalid_list);
|
2008-09-24 00:18:39 +08:00
|
|
|
cond_resched_lock(&vcpu->kvm->mmu_lock);
|
2008-12-02 08:32:02 +08:00
|
|
|
kvm_mmu_pages_init(parent, &parents, &pages);
|
|
|
|
}
|
2008-09-24 00:18:39 +08:00
|
|
|
}
|
|
|
|
|
2011-07-12 03:28:04 +08:00
|
|
|
static void init_shadow_page_table(struct kvm_mmu_page *sp)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < PT64_ENT_PER_PAGE; ++i)
|
|
|
|
sp->spt[i] = 0ull;
|
|
|
|
}
|
|
|
|
|
KVM: MMU: improve write flooding detected
Detecting write-flooding does not work well, when we handle page written, if
the last speculative spte is not accessed, we treat the page is
write-flooding, however, we can speculative spte on many path, such as pte
prefetch, page synced, that means the last speculative spte may be not point
to the written page and the written page can be accessed via other sptes, so
depends on the Accessed bit of the last speculative spte is not enough
Instead of detected page accessed, we can detect whether the spte is accessed
after it is written, if the spte is not accessed but it is written frequently,
we treat is not a page table or it not used for a long time
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-09-22 16:58:36 +08:00
|
|
|
static void __clear_sp_write_flooding_count(struct kvm_mmu_page *sp)
|
|
|
|
{
|
|
|
|
sp->write_flooding_count = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void clear_sp_write_flooding_count(u64 *spte)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *sp = page_header(__pa(spte));
|
|
|
|
|
|
|
|
__clear_sp_write_flooding_count(sp);
|
|
|
|
}
|
|
|
|
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
static struct kvm_mmu_page *kvm_mmu_get_page(struct kvm_vcpu *vcpu,
|
|
|
|
gfn_t gfn,
|
|
|
|
gva_t gaddr,
|
|
|
|
unsigned level,
|
2009-01-11 19:02:10 +08:00
|
|
|
int direct,
|
2007-12-09 23:00:02 +08:00
|
|
|
unsigned access,
|
2008-02-27 04:12:10 +08:00
|
|
|
u64 *parent_pte)
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
{
|
|
|
|
union kvm_mmu_page_role role;
|
|
|
|
unsigned quadrant;
|
2010-05-24 15:41:33 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
2010-06-04 21:56:11 +08:00
|
|
|
struct hlist_node *node;
|
2010-05-24 15:41:33 +08:00
|
|
|
bool need_sync = false;
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
|
2008-12-22 01:20:09 +08:00
|
|
|
role = vcpu->arch.mmu.base_role;
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
role.level = level;
|
2009-01-11 19:02:10 +08:00
|
|
|
role.direct = direct;
|
2010-03-14 16:16:40 +08:00
|
|
|
if (role.direct)
|
2010-04-15 00:20:03 +08:00
|
|
|
role.cr4_pae = 0;
|
2007-12-09 23:00:02 +08:00
|
|
|
role.access = access;
|
2010-09-10 23:30:39 +08:00
|
|
|
if (!vcpu->arch.mmu.direct_map
|
|
|
|
&& vcpu->arch.mmu.root_level <= PT32_ROOT_LEVEL) {
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
quadrant = gaddr >> (PAGE_SHIFT + (PT64_PT_BITS * level));
|
|
|
|
quadrant &= (1 << ((PT32_PT_BITS - PT64_PT_BITS) * level)) - 1;
|
|
|
|
role.quadrant = quadrant;
|
|
|
|
}
|
2010-06-04 21:56:11 +08:00
|
|
|
for_each_gfn_sp(vcpu->kvm, sp, gfn, node) {
|
2010-06-04 21:53:07 +08:00
|
|
|
if (!need_sync && sp->unsync)
|
|
|
|
need_sync = true;
|
2008-09-24 00:18:39 +08:00
|
|
|
|
2010-06-04 21:53:07 +08:00
|
|
|
if (sp->role.word != role.word)
|
|
|
|
continue;
|
2008-09-24 00:18:39 +08:00
|
|
|
|
2010-06-04 21:53:07 +08:00
|
|
|
if (sp->unsync && kvm_sync_page_transient(vcpu, sp))
|
|
|
|
break;
|
KVM: MMU: don't write-protect if have new mapping to unsync page
Two cases maybe happen in kvm_mmu_get_page() function:
- one case is, the goal sp is already in cache, if the sp is unsync,
we only need update it to assure this mapping is valid, but not
mark it sync and not write-protect sp->gfn since it not broke unsync
rule(one shadow page for a gfn)
- another case is, the goal sp not existed, we need create a new sp
for gfn, i.e, gfn (may)has another shadow page, to keep unsync rule,
we should sync(mark sync and write-protect) gfn's unsync shadow page.
After enabling multiple unsync shadows, we sync those shadow pages
only when the new sp not allow to become unsync(also for the unsyc
rule, the new rule is: allow all pte page become unsync)
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2010-05-15 18:52:34 +08:00
|
|
|
|
2010-06-04 21:53:07 +08:00
|
|
|
mmu_page_add_parent_pte(vcpu, sp, parent_pte);
|
|
|
|
if (sp->unsync_children) {
|
2010-05-10 17:34:53 +08:00
|
|
|
kvm_make_request(KVM_REQ_MMU_SYNC, vcpu);
|
2010-06-04 21:53:07 +08:00
|
|
|
kvm_mmu_mark_parents_unsync(sp);
|
|
|
|
} else if (sp->unsync)
|
|
|
|
kvm_mmu_mark_parents_unsync(sp);
|
KVM: MMU: don't write-protect if have new mapping to unsync page
Two cases maybe happen in kvm_mmu_get_page() function:
- one case is, the goal sp is already in cache, if the sp is unsync,
we only need update it to assure this mapping is valid, but not
mark it sync and not write-protect sp->gfn since it not broke unsync
rule(one shadow page for a gfn)
- another case is, the goal sp not existed, we need create a new sp
for gfn, i.e, gfn (may)has another shadow page, to keep unsync rule,
we should sync(mark sync and write-protect) gfn's unsync shadow page.
After enabling multiple unsync shadows, we sync those shadow pages
only when the new sp not allow to become unsync(also for the unsyc
rule, the new rule is: allow all pte page become unsync)
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2010-05-15 18:52:34 +08:00
|
|
|
|
KVM: MMU: improve write flooding detected
Detecting write-flooding does not work well, when we handle page written, if
the last speculative spte is not accessed, we treat the page is
write-flooding, however, we can speculative spte on many path, such as pte
prefetch, page synced, that means the last speculative spte may be not point
to the written page and the written page can be accessed via other sptes, so
depends on the Accessed bit of the last speculative spte is not enough
Instead of detected page accessed, we can detect whether the spte is accessed
after it is written, if the spte is not accessed but it is written frequently,
we treat is not a page table or it not used for a long time
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-09-22 16:58:36 +08:00
|
|
|
__clear_sp_write_flooding_count(sp);
|
2010-06-04 21:53:07 +08:00
|
|
|
trace_kvm_mmu_get_page(sp, false);
|
|
|
|
return sp;
|
|
|
|
}
|
2007-12-19 01:47:18 +08:00
|
|
|
++vcpu->kvm->stat.mmu_cache_miss;
|
2010-05-26 16:49:59 +08:00
|
|
|
sp = kvm_mmu_alloc_page(vcpu, parent_pte, direct);
|
2007-11-21 21:28:32 +08:00
|
|
|
if (!sp)
|
|
|
|
return sp;
|
|
|
|
sp->gfn = gfn;
|
|
|
|
sp->role = role;
|
2010-06-04 21:53:07 +08:00
|
|
|
hlist_add_head(&sp->hash_link,
|
|
|
|
&vcpu->kvm->arch.mmu_page_hash[kvm_page_table_hashfn(gfn)]);
|
2009-01-11 19:02:10 +08:00
|
|
|
if (!direct) {
|
2008-12-02 08:32:03 +08:00
|
|
|
if (rmap_write_protect(vcpu->kvm, gfn))
|
|
|
|
kvm_flush_remote_tlbs(vcpu->kvm);
|
2010-05-24 15:41:33 +08:00
|
|
|
if (level > PT_PAGE_TABLE_LEVEL && need_sync)
|
|
|
|
kvm_sync_pages(vcpu, gfn);
|
|
|
|
|
2008-09-24 00:18:39 +08:00
|
|
|
account_shadowed(vcpu->kvm, gfn);
|
|
|
|
}
|
2011-07-12 03:28:04 +08:00
|
|
|
init_shadow_page_table(sp);
|
2009-07-06 20:58:14 +08:00
|
|
|
trace_kvm_mmu_get_page(sp, true);
|
2007-11-21 21:28:32 +08:00
|
|
|
return sp;
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
}
|
|
|
|
|
2008-12-25 20:39:47 +08:00
|
|
|
static void shadow_walk_init(struct kvm_shadow_walk_iterator *iterator,
|
|
|
|
struct kvm_vcpu *vcpu, u64 addr)
|
|
|
|
{
|
|
|
|
iterator->addr = addr;
|
|
|
|
iterator->shadow_addr = vcpu->arch.mmu.root_hpa;
|
|
|
|
iterator->level = vcpu->arch.mmu.shadow_root_level;
|
2010-09-10 23:31:00 +08:00
|
|
|
|
|
|
|
if (iterator->level == PT64_ROOT_LEVEL &&
|
|
|
|
vcpu->arch.mmu.root_level < PT64_ROOT_LEVEL &&
|
|
|
|
!vcpu->arch.mmu.direct_map)
|
|
|
|
--iterator->level;
|
|
|
|
|
2008-12-25 20:39:47 +08:00
|
|
|
if (iterator->level == PT32E_ROOT_LEVEL) {
|
|
|
|
iterator->shadow_addr
|
|
|
|
= vcpu->arch.mmu.pae_root[(addr >> 30) & 3];
|
|
|
|
iterator->shadow_addr &= PT64_BASE_ADDR_MASK;
|
|
|
|
--iterator->level;
|
|
|
|
if (!iterator->shadow_addr)
|
|
|
|
iterator->level = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool shadow_walk_okay(struct kvm_shadow_walk_iterator *iterator)
|
|
|
|
{
|
|
|
|
if (iterator->level < PT_PAGE_TABLE_LEVEL)
|
|
|
|
return false;
|
2009-06-11 23:07:41 +08:00
|
|
|
|
2008-12-25 20:39:47 +08:00
|
|
|
iterator->index = SHADOW_PT_INDEX(iterator->addr, iterator->level);
|
|
|
|
iterator->sptep = ((u64 *)__va(iterator->shadow_addr)) + iterator->index;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:32:13 +08:00
|
|
|
static void __shadow_walk_next(struct kvm_shadow_walk_iterator *iterator,
|
|
|
|
u64 spte)
|
2008-12-25 20:39:47 +08:00
|
|
|
{
|
2011-07-12 03:32:13 +08:00
|
|
|
if (is_last_spte(spte, iterator->level)) {
|
2011-07-12 03:21:17 +08:00
|
|
|
iterator->level = 0;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:32:13 +08:00
|
|
|
iterator->shadow_addr = spte & PT64_BASE_ADDR_MASK;
|
2008-12-25 20:39:47 +08:00
|
|
|
--iterator->level;
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:32:13 +08:00
|
|
|
static void shadow_walk_next(struct kvm_shadow_walk_iterator *iterator)
|
|
|
|
{
|
|
|
|
return __shadow_walk_next(iterator, *iterator->sptep);
|
|
|
|
}
|
|
|
|
|
2010-07-13 19:27:04 +08:00
|
|
|
static void link_shadow_page(u64 *sptep, struct kvm_mmu_page *sp)
|
|
|
|
{
|
|
|
|
u64 spte;
|
|
|
|
|
|
|
|
spte = __pa(sp->spt)
|
|
|
|
| PT_PRESENT_MASK | PT_ACCESSED_MASK
|
|
|
|
| PT_WRITABLE_MASK | PT_USER_MASK;
|
2011-07-12 03:30:35 +08:00
|
|
|
mmu_spte_set(sptep, spte);
|
2010-07-13 19:27:04 +08:00
|
|
|
}
|
|
|
|
|
2010-07-13 19:27:07 +08:00
|
|
|
static void validate_direct_spte(struct kvm_vcpu *vcpu, u64 *sptep,
|
|
|
|
unsigned direct_access)
|
|
|
|
{
|
|
|
|
if (is_shadow_present_pte(*sptep) && !is_large_pte(*sptep)) {
|
|
|
|
struct kvm_mmu_page *child;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* For the direct sp, if the guest pte's dirty bit
|
|
|
|
* changed form clean to dirty, it will corrupt the
|
|
|
|
* sp's access: allow writable in the read-only sp,
|
|
|
|
* so we should update the spte at this point to get
|
|
|
|
* a new sp with the correct access.
|
|
|
|
*/
|
|
|
|
child = page_header(*sptep & PT64_BASE_ADDR_MASK);
|
|
|
|
if (child->role.access == direct_access)
|
|
|
|
return;
|
|
|
|
|
2011-05-15 23:28:29 +08:00
|
|
|
drop_parent_pte(child, sptep);
|
2010-07-13 19:27:07 +08:00
|
|
|
kvm_flush_remote_tlbs(vcpu->kvm);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-09-22 16:56:06 +08:00
|
|
|
static bool mmu_page_zap_pte(struct kvm *kvm, struct kvm_mmu_page *sp,
|
2011-05-15 23:27:52 +08:00
|
|
|
u64 *spte)
|
|
|
|
{
|
|
|
|
u64 pte;
|
|
|
|
struct kvm_mmu_page *child;
|
|
|
|
|
|
|
|
pte = *spte;
|
|
|
|
if (is_shadow_present_pte(pte)) {
|
2011-09-22 16:56:06 +08:00
|
|
|
if (is_last_spte(pte, sp->role.level)) {
|
2011-07-12 03:28:04 +08:00
|
|
|
drop_spte(kvm, spte);
|
2011-09-22 16:56:06 +08:00
|
|
|
if (is_large_pte(pte))
|
|
|
|
--kvm->stat.lpages;
|
|
|
|
} else {
|
2011-05-15 23:27:52 +08:00
|
|
|
child = page_header(pte & PT64_BASE_ADDR_MASK);
|
2011-05-15 23:28:29 +08:00
|
|
|
drop_parent_pte(child, spte);
|
2011-05-15 23:27:52 +08:00
|
|
|
}
|
2011-09-22 16:56:06 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (is_mmio_spte(pte))
|
2011-07-12 03:33:44 +08:00
|
|
|
mmu_spte_clear_no_track(spte);
|
2011-07-12 03:28:04 +08:00
|
|
|
|
2011-09-22 16:56:06 +08:00
|
|
|
return false;
|
2011-05-15 23:27:52 +08:00
|
|
|
}
|
|
|
|
|
2007-07-17 18:04:56 +08:00
|
|
|
static void kvm_mmu_page_unlink_children(struct kvm *kvm,
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page *sp)
|
2007-01-06 08:36:45 +08:00
|
|
|
{
|
2007-01-06 08:36:46 +08:00
|
|
|
unsigned i;
|
|
|
|
|
2011-05-15 23:27:52 +08:00
|
|
|
for (i = 0; i < PT64_ENT_PER_PAGE; ++i)
|
|
|
|
mmu_page_zap_pte(kvm, sp, sp->spt + i);
|
2007-01-06 08:36:45 +08:00
|
|
|
}
|
|
|
|
|
2007-11-21 21:28:32 +08:00
|
|
|
static void kvm_mmu_put_page(struct kvm_mmu_page *sp, u64 *parent_pte)
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
{
|
2007-11-21 21:28:32 +08:00
|
|
|
mmu_page_remove_parent_pte(sp, parent_pte);
|
2007-01-06 08:36:45 +08:00
|
|
|
}
|
|
|
|
|
2008-07-11 22:59:46 +08:00
|
|
|
static void kvm_mmu_unlink_parents(struct kvm *kvm, struct kvm_mmu_page *sp)
|
2007-01-06 08:36:45 +08:00
|
|
|
{
|
2012-03-21 22:50:34 +08:00
|
|
|
u64 *sptep;
|
|
|
|
struct rmap_iterator iter;
|
2007-01-06 08:36:45 +08:00
|
|
|
|
2012-03-21 22:50:34 +08:00
|
|
|
while ((sptep = rmap_get_first(sp->parent_ptes, &iter)))
|
|
|
|
drop_parent_pte(sp, sptep);
|
2008-07-11 22:59:46 +08:00
|
|
|
}
|
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
static int mmu_zap_unsync_children(struct kvm *kvm,
|
2010-06-04 21:53:54 +08:00
|
|
|
struct kvm_mmu_page *parent,
|
|
|
|
struct list_head *invalid_list)
|
2008-09-24 00:18:39 +08:00
|
|
|
{
|
2008-12-02 08:32:02 +08:00
|
|
|
int i, zapped = 0;
|
|
|
|
struct mmu_page_path parents;
|
|
|
|
struct kvm_mmu_pages pages;
|
2008-09-24 00:18:39 +08:00
|
|
|
|
2008-12-02 08:32:02 +08:00
|
|
|
if (parent->role.level == PT_PAGE_TABLE_LEVEL)
|
2008-09-24 00:18:39 +08:00
|
|
|
return 0;
|
2008-12-02 08:32:02 +08:00
|
|
|
|
|
|
|
kvm_mmu_pages_init(parent, &parents, &pages);
|
|
|
|
while (mmu_unsync_walk(parent, &pages)) {
|
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
|
|
|
|
for_each_sp(pages, sp, parents, i) {
|
2010-06-04 21:53:54 +08:00
|
|
|
kvm_mmu_prepare_zap_page(kvm, sp, invalid_list);
|
2008-12-02 08:32:02 +08:00
|
|
|
mmu_pages_clear_parents(&parents);
|
2010-04-16 16:34:42 +08:00
|
|
|
zapped++;
|
2008-12-02 08:32:02 +08:00
|
|
|
}
|
|
|
|
kvm_mmu_pages_init(parent, &parents, &pages);
|
|
|
|
}
|
|
|
|
|
|
|
|
return zapped;
|
2008-09-24 00:18:39 +08:00
|
|
|
}
|
|
|
|
|
2010-06-04 21:53:54 +08:00
|
|
|
static int kvm_mmu_prepare_zap_page(struct kvm *kvm, struct kvm_mmu_page *sp,
|
|
|
|
struct list_head *invalid_list)
|
2008-07-11 22:59:46 +08:00
|
|
|
{
|
2008-09-24 00:18:39 +08:00
|
|
|
int ret;
|
2009-07-06 20:58:14 +08:00
|
|
|
|
2010-06-04 21:53:54 +08:00
|
|
|
trace_kvm_mmu_prepare_zap_page(sp);
|
2008-07-11 22:59:46 +08:00
|
|
|
++kvm->stat.mmu_shadow_zapped;
|
2010-06-04 21:53:54 +08:00
|
|
|
ret = mmu_zap_unsync_children(kvm, sp, invalid_list);
|
2007-11-21 21:28:32 +08:00
|
|
|
kvm_mmu_page_unlink_children(kvm, sp);
|
2008-07-11 22:59:46 +08:00
|
|
|
kvm_mmu_unlink_parents(kvm, sp);
|
2009-01-11 19:02:10 +08:00
|
|
|
if (!sp->role.invalid && !sp->role.direct)
|
2008-07-11 23:07:26 +08:00
|
|
|
unaccount_shadowed(kvm, sp->gfn);
|
2008-09-24 00:18:39 +08:00
|
|
|
if (sp->unsync)
|
|
|
|
kvm_unlink_unsync_page(kvm, sp);
|
2007-11-21 21:28:32 +08:00
|
|
|
if (!sp->root_count) {
|
2010-05-05 09:03:49 +08:00
|
|
|
/* Count self */
|
|
|
|
ret++;
|
2010-06-04 21:53:54 +08:00
|
|
|
list_move(&sp->link, invalid_list);
|
2011-07-12 03:26:40 +08:00
|
|
|
kvm_mod_used_mmu_pages(kvm, -1);
|
2008-02-21 03:47:24 +08:00
|
|
|
} else {
|
2008-07-11 23:07:26 +08:00
|
|
|
list_move(&sp->link, &kvm->arch.active_mmu_pages);
|
2008-02-21 03:47:24 +08:00
|
|
|
kvm_reload_remote_mmus(kvm);
|
|
|
|
}
|
2010-06-04 21:53:54 +08:00
|
|
|
|
|
|
|
sp->role.invalid = 1;
|
2008-09-24 00:18:39 +08:00
|
|
|
return ret;
|
2007-01-06 08:36:45 +08:00
|
|
|
}
|
|
|
|
|
2010-06-04 21:53:54 +08:00
|
|
|
static void kvm_mmu_commit_zap_page(struct kvm *kvm,
|
|
|
|
struct list_head *invalid_list)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
|
|
|
|
if (list_empty(invalid_list))
|
|
|
|
return;
|
|
|
|
|
2012-05-14 20:44:06 +08:00
|
|
|
/*
|
|
|
|
* wmb: make sure everyone sees our modifications to the page tables
|
|
|
|
* rmb: make sure we see changes to vcpu->mode
|
|
|
|
*/
|
|
|
|
smp_mb();
|
2011-07-12 03:34:24 +08:00
|
|
|
|
2012-05-14 20:44:06 +08:00
|
|
|
/*
|
|
|
|
* Wait for all vcpus to exit guest mode and/or lockless shadow
|
|
|
|
* page table walks.
|
|
|
|
*/
|
|
|
|
kvm_flush_remote_tlbs(kvm);
|
2011-07-12 03:32:13 +08:00
|
|
|
|
2010-06-04 21:53:54 +08:00
|
|
|
do {
|
|
|
|
sp = list_first_entry(invalid_list, struct kvm_mmu_page, link);
|
|
|
|
WARN_ON(!sp->role.invalid || sp->root_count);
|
2011-07-12 03:27:14 +08:00
|
|
|
kvm_mmu_isolate_page(sp);
|
2011-07-12 03:26:40 +08:00
|
|
|
kvm_mmu_free_page(sp);
|
2010-06-04 21:53:54 +08:00
|
|
|
} while (!list_empty(invalid_list));
|
|
|
|
}
|
|
|
|
|
2007-10-03 00:52:55 +08:00
|
|
|
/*
|
|
|
|
* Changing the number of mmu pages allocated to the vm
|
2010-08-20 09:11:28 +08:00
|
|
|
* Note: if goal_nr_mmu_pages is too small, you will get dead lock
|
2007-10-03 00:52:55 +08:00
|
|
|
*/
|
2010-08-20 09:11:28 +08:00
|
|
|
void kvm_mmu_change_mmu_pages(struct kvm *kvm, unsigned int goal_nr_mmu_pages)
|
2007-10-03 00:52:55 +08:00
|
|
|
{
|
2010-06-04 21:55:29 +08:00
|
|
|
LIST_HEAD(invalid_list);
|
2007-10-03 00:52:55 +08:00
|
|
|
/*
|
|
|
|
* If we set the number of mmu pages to be smaller be than the
|
|
|
|
* number of actived pages , we must to free some mmu pages before we
|
|
|
|
* change the value
|
|
|
|
*/
|
|
|
|
|
2010-08-20 09:11:28 +08:00
|
|
|
if (kvm->arch.n_used_mmu_pages > goal_nr_mmu_pages) {
|
|
|
|
while (kvm->arch.n_used_mmu_pages > goal_nr_mmu_pages &&
|
2010-04-16 16:34:42 +08:00
|
|
|
!list_empty(&kvm->arch.active_mmu_pages)) {
|
2007-10-03 00:52:55 +08:00
|
|
|
struct kvm_mmu_page *page;
|
|
|
|
|
2007-12-14 10:01:48 +08:00
|
|
|
page = container_of(kvm->arch.active_mmu_pages.prev,
|
2007-10-03 00:52:55 +08:00
|
|
|
struct kvm_mmu_page, link);
|
2010-08-24 10:31:07 +08:00
|
|
|
kvm_mmu_prepare_zap_page(kvm, page, &invalid_list);
|
2007-10-03 00:52:55 +08:00
|
|
|
}
|
2011-07-12 03:26:40 +08:00
|
|
|
kvm_mmu_commit_zap_page(kvm, &invalid_list);
|
2010-08-20 09:11:28 +08:00
|
|
|
goal_nr_mmu_pages = kvm->arch.n_used_mmu_pages;
|
2007-10-03 00:52:55 +08:00
|
|
|
}
|
|
|
|
|
2010-08-20 09:11:28 +08:00
|
|
|
kvm->arch.n_max_mmu_pages = goal_nr_mmu_pages;
|
2007-10-03 00:52:55 +08:00
|
|
|
}
|
|
|
|
|
2011-09-22 17:02:48 +08:00
|
|
|
int kvm_mmu_unprotect_page(struct kvm *kvm, gfn_t gfn)
|
2007-01-06 08:36:45 +08:00
|
|
|
{
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
2010-06-04 21:56:11 +08:00
|
|
|
struct hlist_node *node;
|
2010-06-04 21:55:29 +08:00
|
|
|
LIST_HEAD(invalid_list);
|
2007-01-06 08:36:45 +08:00
|
|
|
int r;
|
|
|
|
|
2010-08-28 19:19:42 +08:00
|
|
|
pgprintk("%s: looking for gfn %llx\n", __func__, gfn);
|
2007-01-06 08:36:45 +08:00
|
|
|
r = 0;
|
2011-09-22 17:02:48 +08:00
|
|
|
spin_lock(&kvm->mmu_lock);
|
2010-06-04 21:56:11 +08:00
|
|
|
for_each_gfn_indirect_valid_sp(kvm, sp, gfn, node) {
|
2010-08-28 19:19:42 +08:00
|
|
|
pgprintk("%s: gfn %llx role %x\n", __func__, gfn,
|
2010-06-04 21:53:07 +08:00
|
|
|
sp->role.word);
|
|
|
|
r = 1;
|
2010-06-04 21:56:11 +08:00
|
|
|
kvm_mmu_prepare_zap_page(kvm, sp, &invalid_list);
|
2010-06-04 21:53:07 +08:00
|
|
|
}
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_commit_zap_page(kvm, &invalid_list);
|
2011-09-22 17:02:48 +08:00
|
|
|
spin_unlock(&kvm->mmu_lock);
|
|
|
|
|
2007-01-06 08:36:45 +08:00
|
|
|
return r;
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
}
|
2011-09-22 17:02:48 +08:00
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_unprotect_page);
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
|
2007-11-21 20:20:22 +08:00
|
|
|
static void page_header_update_slot(struct kvm *kvm, void *pte, gfn_t gfn)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2009-12-24 00:35:21 +08:00
|
|
|
int slot = memslot_id(kvm, gfn);
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page *sp = page_header(__pa(pte));
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2008-10-16 17:30:57 +08:00
|
|
|
__set_bit(slot, sp->slot_bitmap);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2008-10-09 16:01:56 +08:00
|
|
|
/*
|
|
|
|
* The function is based on mtrr_type_lookup() in
|
|
|
|
* arch/x86/kernel/cpu/mtrr/generic.c
|
|
|
|
*/
|
|
|
|
static int get_mtrr_type(struct mtrr_state_type *mtrr_state,
|
|
|
|
u64 start, u64 end)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
u64 base, mask;
|
|
|
|
u8 prev_match, curr_match;
|
|
|
|
int num_var_ranges = KVM_NR_VAR_MTRR;
|
|
|
|
|
|
|
|
if (!mtrr_state->enabled)
|
|
|
|
return 0xFF;
|
|
|
|
|
|
|
|
/* Make end inclusive end, instead of exclusive */
|
|
|
|
end--;
|
|
|
|
|
|
|
|
/* Look in fixed ranges. Just return the type as per start */
|
|
|
|
if (mtrr_state->have_fixed && (start < 0x100000)) {
|
|
|
|
int idx;
|
|
|
|
|
|
|
|
if (start < 0x80000) {
|
|
|
|
idx = 0;
|
|
|
|
idx += (start >> 16);
|
|
|
|
return mtrr_state->fixed_ranges[idx];
|
|
|
|
} else if (start < 0xC0000) {
|
|
|
|
idx = 1 * 8;
|
|
|
|
idx += ((start - 0x80000) >> 14);
|
|
|
|
return mtrr_state->fixed_ranges[idx];
|
|
|
|
} else if (start < 0x1000000) {
|
|
|
|
idx = 3 * 8;
|
|
|
|
idx += ((start - 0xC0000) >> 12);
|
|
|
|
return mtrr_state->fixed_ranges[idx];
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Look in variable ranges
|
|
|
|
* Look of multiple ranges matching this address and pick type
|
|
|
|
* as per MTRR precedence
|
|
|
|
*/
|
|
|
|
if (!(mtrr_state->enabled & 2))
|
|
|
|
return mtrr_state->def_type;
|
|
|
|
|
|
|
|
prev_match = 0xFF;
|
|
|
|
for (i = 0; i < num_var_ranges; ++i) {
|
|
|
|
unsigned short start_state, end_state;
|
|
|
|
|
|
|
|
if (!(mtrr_state->var_ranges[i].mask_lo & (1 << 11)))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
base = (((u64)mtrr_state->var_ranges[i].base_hi) << 32) +
|
|
|
|
(mtrr_state->var_ranges[i].base_lo & PAGE_MASK);
|
|
|
|
mask = (((u64)mtrr_state->var_ranges[i].mask_hi) << 32) +
|
|
|
|
(mtrr_state->var_ranges[i].mask_lo & PAGE_MASK);
|
|
|
|
|
|
|
|
start_state = ((start & mask) == (base & mask));
|
|
|
|
end_state = ((end & mask) == (base & mask));
|
|
|
|
if (start_state != end_state)
|
|
|
|
return 0xFE;
|
|
|
|
|
|
|
|
if ((start & mask) != (base & mask))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
curr_match = mtrr_state->var_ranges[i].base_lo & 0xff;
|
|
|
|
if (prev_match == 0xFF) {
|
|
|
|
prev_match = curr_match;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (prev_match == MTRR_TYPE_UNCACHABLE ||
|
|
|
|
curr_match == MTRR_TYPE_UNCACHABLE)
|
|
|
|
return MTRR_TYPE_UNCACHABLE;
|
|
|
|
|
|
|
|
if ((prev_match == MTRR_TYPE_WRBACK &&
|
|
|
|
curr_match == MTRR_TYPE_WRTHROUGH) ||
|
|
|
|
(prev_match == MTRR_TYPE_WRTHROUGH &&
|
|
|
|
curr_match == MTRR_TYPE_WRBACK)) {
|
|
|
|
prev_match = MTRR_TYPE_WRTHROUGH;
|
|
|
|
curr_match = MTRR_TYPE_WRTHROUGH;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (prev_match != curr_match)
|
|
|
|
return MTRR_TYPE_UNCACHABLE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (prev_match != 0xFF)
|
|
|
|
return prev_match;
|
|
|
|
|
|
|
|
return mtrr_state->def_type;
|
|
|
|
}
|
|
|
|
|
2009-04-27 20:35:42 +08:00
|
|
|
u8 kvm_get_guest_memory_type(struct kvm_vcpu *vcpu, gfn_t gfn)
|
2008-10-09 16:01:56 +08:00
|
|
|
{
|
|
|
|
u8 mtrr;
|
|
|
|
|
|
|
|
mtrr = get_mtrr_type(&vcpu->arch.mtrr_state, gfn << PAGE_SHIFT,
|
|
|
|
(gfn << PAGE_SHIFT) + PAGE_SIZE);
|
|
|
|
if (mtrr == 0xfe || mtrr == 0xff)
|
|
|
|
mtrr = MTRR_TYPE_WRBACK;
|
|
|
|
return mtrr;
|
|
|
|
}
|
2009-04-27 20:35:42 +08:00
|
|
|
EXPORT_SYMBOL_GPL(kvm_get_guest_memory_type);
|
2008-10-09 16:01:56 +08:00
|
|
|
|
2010-05-24 15:40:07 +08:00
|
|
|
static void __kvm_unsync_page(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp)
|
|
|
|
{
|
|
|
|
trace_kvm_mmu_unsync_page(sp);
|
|
|
|
++vcpu->kvm->stat.mmu_unsync;
|
|
|
|
sp->unsync = 1;
|
|
|
|
|
|
|
|
kvm_mmu_mark_parents_unsync(sp);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void kvm_unsync_pages(struct kvm_vcpu *vcpu, gfn_t gfn)
|
2008-09-24 00:18:39 +08:00
|
|
|
{
|
|
|
|
struct kvm_mmu_page *s;
|
2010-06-04 21:56:11 +08:00
|
|
|
struct hlist_node *node;
|
2010-05-24 15:40:07 +08:00
|
|
|
|
2010-06-04 21:56:11 +08:00
|
|
|
for_each_gfn_indirect_valid_sp(vcpu->kvm, s, gfn, node) {
|
2010-06-04 21:53:07 +08:00
|
|
|
if (s->unsync)
|
2008-09-24 00:18:39 +08:00
|
|
|
continue;
|
2010-05-24 15:40:07 +08:00
|
|
|
WARN_ON(s->role.level != PT_PAGE_TABLE_LEVEL);
|
|
|
|
__kvm_unsync_page(vcpu, s);
|
2008-09-24 00:18:39 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int mmu_need_write_protect(struct kvm_vcpu *vcpu, gfn_t gfn,
|
|
|
|
bool can_unsync)
|
|
|
|
{
|
2010-05-24 15:40:07 +08:00
|
|
|
struct kvm_mmu_page *s;
|
2010-06-04 21:56:11 +08:00
|
|
|
struct hlist_node *node;
|
2010-05-24 15:40:07 +08:00
|
|
|
bool need_unsync = false;
|
|
|
|
|
2010-06-04 21:56:11 +08:00
|
|
|
for_each_gfn_indirect_valid_sp(vcpu->kvm, s, gfn, node) {
|
KVM: MMU: fix writable sync sp mapping
While we sync many unsync sp at one time(in mmu_sync_children()),
we may mapping the spte writable, it's dangerous, if one unsync
sp's mapping gfn is another unsync page's gfn.
For example:
SP1.pte[0] = P
SP2.gfn's pfn = P
[SP1.pte[0] = SP2.gfn's pfn]
First, we write protected SP1 and SP2, but SP1 and SP2 are still the
unsync sp.
Then, sync SP1 first, it will detect SP1.pte[0].gfn only has one unsync-sp,
that is SP2, so it will mapping it writable, but we plan to sync SP2 soon,
at this point, the SP2->unsync is not reliable since later we sync SP2 but
SP2->gfn is already writable.
So the final result is: SP2 is the sync page but SP2.gfn is writable.
This bug will corrupt guest's page table, fixed by mark read-only mapping
if the mapped gfn has shadow pages.
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Marcelo Tosatti <mtosatti@redhat.com>
2010-06-30 16:02:02 +08:00
|
|
|
if (!can_unsync)
|
|
|
|
return 1;
|
|
|
|
|
2010-05-24 15:40:07 +08:00
|
|
|
if (s->role.level != PT_PAGE_TABLE_LEVEL)
|
2008-09-24 00:18:39 +08:00
|
|
|
return 1;
|
2010-05-24 15:40:07 +08:00
|
|
|
|
|
|
|
if (!need_unsync && !s->unsync) {
|
|
|
|
need_unsync = true;
|
|
|
|
}
|
2008-09-24 00:18:39 +08:00
|
|
|
}
|
2010-05-24 15:40:07 +08:00
|
|
|
if (need_unsync)
|
|
|
|
kvm_unsync_pages(vcpu, gfn);
|
2008-09-24 00:18:39 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2009-06-10 19:24:23 +08:00
|
|
|
static int set_spte(struct kvm_vcpu *vcpu, u64 *sptep,
|
2008-09-24 00:18:30 +08:00
|
|
|
unsigned pte_access, int user_fault,
|
2011-07-12 03:24:39 +08:00
|
|
|
int write_fault, int level,
|
2009-04-06 01:54:47 +08:00
|
|
|
gfn_t gfn, pfn_t pfn, bool speculative,
|
2010-11-19 17:03:22 +08:00
|
|
|
bool can_unsync, bool host_writable)
|
2007-12-09 23:40:31 +08:00
|
|
|
{
|
2012-06-20 15:58:33 +08:00
|
|
|
u64 spte;
|
2008-09-24 00:18:30 +08:00
|
|
|
int ret = 0;
|
2008-10-09 16:01:57 +08:00
|
|
|
|
2011-07-12 03:33:44 +08:00
|
|
|
if (set_mmio_spte(sptep, gfn, pfn, pte_access))
|
|
|
|
return 0;
|
|
|
|
|
2010-10-23 00:18:16 +08:00
|
|
|
spte = PT_PRESENT_MASK;
|
2008-03-18 17:05:52 +08:00
|
|
|
if (!speculative)
|
2008-08-28 01:01:04 +08:00
|
|
|
spte |= shadow_accessed_mask;
|
2011-07-12 03:24:39 +08:00
|
|
|
|
2008-04-25 21:13:50 +08:00
|
|
|
if (pte_access & ACC_EXEC_MASK)
|
|
|
|
spte |= shadow_x_mask;
|
|
|
|
else
|
|
|
|
spte |= shadow_nx_mask;
|
2012-06-20 15:58:58 +08:00
|
|
|
|
2007-12-09 23:40:31 +08:00
|
|
|
if (pte_access & ACC_USER_MASK)
|
2008-04-25 21:13:50 +08:00
|
|
|
spte |= shadow_user_mask;
|
2012-06-20 15:58:58 +08:00
|
|
|
|
2009-07-27 22:30:44 +08:00
|
|
|
if (level > PT_PAGE_TABLE_LEVEL)
|
2008-02-23 22:44:30 +08:00
|
|
|
spte |= PT_PAGE_SIZE_MASK;
|
2010-09-13 22:45:28 +08:00
|
|
|
if (tdp_enabled)
|
2009-04-27 20:35:42 +08:00
|
|
|
spte |= kvm_x86_ops->get_mt_mask(vcpu, gfn,
|
|
|
|
kvm_is_mmio_pfn(pfn));
|
2007-12-09 23:40:31 +08:00
|
|
|
|
2010-11-19 17:03:22 +08:00
|
|
|
if (host_writable)
|
2009-09-24 02:47:17 +08:00
|
|
|
spte |= SPTE_HOST_WRITEABLE;
|
2010-12-23 16:09:29 +08:00
|
|
|
else
|
|
|
|
pte_access &= ~ACC_WRITE_MASK;
|
2009-09-24 02:47:17 +08:00
|
|
|
|
2008-04-03 03:46:56 +08:00
|
|
|
spte |= (u64)pfn << PAGE_SHIFT;
|
2007-12-09 23:40:31 +08:00
|
|
|
|
|
|
|
if ((pte_access & ACC_WRITE_MASK)
|
2010-09-10 23:30:39 +08:00
|
|
|
|| (!vcpu->arch.mmu.direct_map && write_fault
|
|
|
|
&& !is_write_protection(vcpu) && !user_fault)) {
|
2007-12-09 23:40:31 +08:00
|
|
|
|
2009-07-27 22:30:44 +08:00
|
|
|
if (level > PT_PAGE_TABLE_LEVEL &&
|
|
|
|
has_wrprotected_page(vcpu->kvm, gfn, level)) {
|
2008-09-24 00:18:32 +08:00
|
|
|
ret = 1;
|
2011-07-12 03:28:04 +08:00
|
|
|
drop_spte(vcpu->kvm, sptep);
|
2010-06-06 19:31:27 +08:00
|
|
|
goto done;
|
2008-09-24 00:18:32 +08:00
|
|
|
}
|
|
|
|
|
2012-06-20 15:58:58 +08:00
|
|
|
spte |= PT_WRITABLE_MASK | SPTE_MMU_WRITEABLE;
|
2007-12-09 23:40:31 +08:00
|
|
|
|
2010-09-10 23:30:39 +08:00
|
|
|
if (!vcpu->arch.mmu.direct_map
|
2011-06-06 21:11:54 +08:00
|
|
|
&& !(pte_access & ACC_WRITE_MASK)) {
|
2010-05-27 19:35:58 +08:00
|
|
|
spte &= ~PT_USER_MASK;
|
2011-06-06 21:11:54 +08:00
|
|
|
/*
|
|
|
|
* If we converted a user page to a kernel page,
|
|
|
|
* so that the kernel can write to it when cr0.wp=0,
|
|
|
|
* then we should prevent the kernel from executing it
|
|
|
|
* if SMEP is enabled.
|
|
|
|
*/
|
|
|
|
if (kvm_read_cr4_bits(vcpu, X86_CR4_SMEP))
|
|
|
|
spte |= PT64_NX_MASK;
|
|
|
|
}
|
2010-05-27 19:35:58 +08:00
|
|
|
|
2008-11-25 22:58:07 +08:00
|
|
|
/*
|
|
|
|
* Optimization: for pte sync, if spte was writable the hash
|
|
|
|
* lookup is unnecessary (and expensive). Write protection
|
|
|
|
* is responsibility of mmu_get_page / kvm_sync_page.
|
|
|
|
* Same reasoning can be applied to dirty page accounting.
|
|
|
|
*/
|
2010-01-18 17:45:10 +08:00
|
|
|
if (!can_unsync && is_writable_pte(*sptep))
|
2008-11-25 22:58:07 +08:00
|
|
|
goto set_pte;
|
|
|
|
|
2008-09-24 00:18:39 +08:00
|
|
|
if (mmu_need_write_protect(vcpu, gfn, can_unsync)) {
|
2010-08-28 19:19:42 +08:00
|
|
|
pgprintk("%s: found shadow page for %llx, marking ro\n",
|
2008-03-04 04:59:56 +08:00
|
|
|
__func__, gfn);
|
2008-09-24 00:18:30 +08:00
|
|
|
ret = 1;
|
2007-12-09 23:40:31 +08:00
|
|
|
pte_access &= ~ACC_WRITE_MASK;
|
2012-06-20 15:58:58 +08:00
|
|
|
spte &= ~(PT_WRITABLE_MASK | SPTE_MMU_WRITEABLE);
|
2007-12-09 23:40:31 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pte_access & ACC_WRITE_MASK)
|
|
|
|
mark_page_dirty(vcpu->kvm, gfn);
|
|
|
|
|
2008-09-24 00:18:32 +08:00
|
|
|
set_pte:
|
2012-06-20 15:58:33 +08:00
|
|
|
if (mmu_spte_update(sptep, spte))
|
2010-11-19 17:02:35 +08:00
|
|
|
kvm_flush_remote_tlbs(vcpu->kvm);
|
2010-06-06 19:31:27 +08:00
|
|
|
done:
|
2008-09-24 00:18:30 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2009-06-10 19:24:23 +08:00
|
|
|
static void mmu_set_spte(struct kvm_vcpu *vcpu, u64 *sptep,
|
2008-09-24 00:18:30 +08:00
|
|
|
unsigned pt_access, unsigned pte_access,
|
2011-07-12 03:24:39 +08:00
|
|
|
int user_fault, int write_fault,
|
2011-07-12 03:25:56 +08:00
|
|
|
int *emulate, int level, gfn_t gfn,
|
2009-09-24 02:47:17 +08:00
|
|
|
pfn_t pfn, bool speculative,
|
2010-11-19 17:03:22 +08:00
|
|
|
bool host_writable)
|
2008-09-24 00:18:30 +08:00
|
|
|
{
|
|
|
|
int was_rmapped = 0;
|
2009-08-06 02:43:58 +08:00
|
|
|
int rmap_count;
|
2008-09-24 00:18:30 +08:00
|
|
|
|
|
|
|
pgprintk("%s: spte %llx access %x write_fault %d"
|
2010-08-28 19:19:42 +08:00
|
|
|
" user_fault %d gfn %llx\n",
|
2009-06-10 19:24:23 +08:00
|
|
|
__func__, *sptep, pt_access,
|
2008-09-24 00:18:30 +08:00
|
|
|
write_fault, user_fault, gfn);
|
|
|
|
|
2009-06-10 19:24:23 +08:00
|
|
|
if (is_rmap_spte(*sptep)) {
|
2008-09-24 00:18:30 +08:00
|
|
|
/*
|
|
|
|
* If we overwrite a PTE page pointer with a 2MB PMD, unlink
|
|
|
|
* the parent of the now unreachable PTE.
|
|
|
|
*/
|
2009-07-27 22:30:44 +08:00
|
|
|
if (level > PT_PAGE_TABLE_LEVEL &&
|
|
|
|
!is_large_pte(*sptep)) {
|
2008-09-24 00:18:30 +08:00
|
|
|
struct kvm_mmu_page *child;
|
2009-06-10 19:24:23 +08:00
|
|
|
u64 pte = *sptep;
|
2008-09-24 00:18:30 +08:00
|
|
|
|
|
|
|
child = page_header(pte & PT64_BASE_ADDR_MASK);
|
2011-05-15 23:28:29 +08:00
|
|
|
drop_parent_pte(child, sptep);
|
2010-05-28 20:44:59 +08:00
|
|
|
kvm_flush_remote_tlbs(vcpu->kvm);
|
2009-06-10 19:24:23 +08:00
|
|
|
} else if (pfn != spte_to_pfn(*sptep)) {
|
2010-08-28 19:19:42 +08:00
|
|
|
pgprintk("hfn old %llx new %llx\n",
|
2009-06-10 19:24:23 +08:00
|
|
|
spte_to_pfn(*sptep), pfn);
|
2011-07-12 03:28:04 +08:00
|
|
|
drop_spte(vcpu->kvm, sptep);
|
2010-06-30 16:04:06 +08:00
|
|
|
kvm_flush_remote_tlbs(vcpu->kvm);
|
2009-02-18 21:08:59 +08:00
|
|
|
} else
|
|
|
|
was_rmapped = 1;
|
2008-09-24 00:18:30 +08:00
|
|
|
}
|
2009-07-27 22:30:44 +08:00
|
|
|
|
2009-06-10 19:24:23 +08:00
|
|
|
if (set_spte(vcpu, sptep, pte_access, user_fault, write_fault,
|
2011-07-12 03:24:39 +08:00
|
|
|
level, gfn, pfn, speculative, true,
|
2010-11-19 17:03:22 +08:00
|
|
|
host_writable)) {
|
2008-09-24 00:18:30 +08:00
|
|
|
if (write_fault)
|
2011-07-12 03:25:56 +08:00
|
|
|
*emulate = 1;
|
2010-06-08 20:05:57 +08:00
|
|
|
kvm_mmu_flush_tlb(vcpu);
|
2008-09-24 00:18:31 +08:00
|
|
|
}
|
2008-09-24 00:18:30 +08:00
|
|
|
|
2011-07-12 03:33:44 +08:00
|
|
|
if (unlikely(is_mmio_spte(*sptep) && emulate))
|
|
|
|
*emulate = 1;
|
|
|
|
|
2009-06-10 19:24:23 +08:00
|
|
|
pgprintk("%s: setting spte %llx\n", __func__, *sptep);
|
2010-08-28 19:19:42 +08:00
|
|
|
pgprintk("instantiating %s PTE (%s) at %llx (%llx) addr %p\n",
|
2009-06-10 19:24:23 +08:00
|
|
|
is_large_pte(*sptep)? "2MB" : "4kB",
|
2009-07-09 22:36:01 +08:00
|
|
|
*sptep & PT_PRESENT_MASK ?"RW":"R", gfn,
|
|
|
|
*sptep, sptep);
|
2009-06-10 19:24:23 +08:00
|
|
|
if (!was_rmapped && is_large_pte(*sptep))
|
2008-02-23 22:44:30 +08:00
|
|
|
++vcpu->kvm->stat.lpages;
|
|
|
|
|
2011-07-12 03:22:01 +08:00
|
|
|
if (is_shadow_present_pte(*sptep)) {
|
|
|
|
page_header_update_slot(vcpu->kvm, sptep, gfn);
|
|
|
|
if (!was_rmapped) {
|
|
|
|
rmap_count = rmap_add(vcpu, sptep, gfn);
|
|
|
|
if (rmap_count > RMAP_RECYCLE_THRESHOLD)
|
|
|
|
rmap_recycle(vcpu, sptep, gfn);
|
|
|
|
}
|
2007-12-09 23:40:31 +08:00
|
|
|
}
|
2012-08-03 15:42:10 +08:00
|
|
|
|
|
|
|
if (!is_error_pfn(pfn))
|
|
|
|
kvm_release_pfn_clean(pfn);
|
2007-12-09 23:40:31 +08:00
|
|
|
}
|
|
|
|
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
static void nonpaging_new_cr3(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2012-07-08 22:16:30 +08:00
|
|
|
mmu_free_roots(vcpu);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2010-08-22 19:12:48 +08:00
|
|
|
static pfn_t pte_prefetch_gfn_to_pfn(struct kvm_vcpu *vcpu, gfn_t gfn,
|
|
|
|
bool no_dirty_log)
|
|
|
|
{
|
|
|
|
struct kvm_memory_slot *slot;
|
|
|
|
|
2011-03-09 15:43:00 +08:00
|
|
|
slot = gfn_to_memslot_dirty_bitmap(vcpu, gfn, no_dirty_log);
|
2012-07-17 21:54:11 +08:00
|
|
|
if (!slot)
|
2012-08-03 15:37:54 +08:00
|
|
|
return KVM_PFN_ERR_FAULT;
|
2010-08-22 19:12:48 +08:00
|
|
|
|
2012-08-21 10:59:12 +08:00
|
|
|
return gfn_to_pfn_memslot_atomic(slot, gfn);
|
2010-08-22 19:12:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int direct_pte_prefetch_many(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu_page *sp,
|
|
|
|
u64 *start, u64 *end)
|
|
|
|
{
|
|
|
|
struct page *pages[PTE_PREFETCH_NUM];
|
|
|
|
unsigned access = sp->role.access;
|
|
|
|
int i, ret;
|
|
|
|
gfn_t gfn;
|
|
|
|
|
|
|
|
gfn = kvm_mmu_page_get_gfn(sp, start - sp->spt);
|
2011-03-09 15:43:00 +08:00
|
|
|
if (!gfn_to_memslot_dirty_bitmap(vcpu, gfn, access & ACC_WRITE_MASK))
|
2010-08-22 19:12:48 +08:00
|
|
|
return -1;
|
|
|
|
|
|
|
|
ret = gfn_to_page_many_atomic(vcpu->kvm, gfn, pages, end - start);
|
|
|
|
if (ret <= 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
for (i = 0; i < ret; i++, gfn++, start++)
|
|
|
|
mmu_set_spte(vcpu, start, ACC_ALL,
|
2011-07-12 03:24:39 +08:00
|
|
|
access, 0, 0, NULL,
|
2010-08-22 19:12:48 +08:00
|
|
|
sp->role.level, gfn,
|
|
|
|
page_to_pfn(pages[i]), true, true);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __direct_pte_prefetch(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu_page *sp, u64 *sptep)
|
|
|
|
{
|
|
|
|
u64 *spte, *start = NULL;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
WARN_ON(!sp->role.direct);
|
|
|
|
|
|
|
|
i = (sptep - sp->spt) & ~(PTE_PREFETCH_NUM - 1);
|
|
|
|
spte = sp->spt + i;
|
|
|
|
|
|
|
|
for (i = 0; i < PTE_PREFETCH_NUM; i++, spte++) {
|
2011-07-12 03:28:04 +08:00
|
|
|
if (is_shadow_present_pte(*spte) || spte == sptep) {
|
2010-08-22 19:12:48 +08:00
|
|
|
if (!start)
|
|
|
|
continue;
|
|
|
|
if (direct_pte_prefetch_many(vcpu, sp, start, spte) < 0)
|
|
|
|
break;
|
|
|
|
start = NULL;
|
|
|
|
} else if (!start)
|
|
|
|
start = spte;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void direct_pte_prefetch(struct kvm_vcpu *vcpu, u64 *sptep)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Since it's no accessed bit on EPT, it's no way to
|
|
|
|
* distinguish between actually accessed translations
|
|
|
|
* and prefetched, so disable pte prefetch if EPT is
|
|
|
|
* enabled.
|
|
|
|
*/
|
|
|
|
if (!shadow_accessed_mask)
|
|
|
|
return;
|
|
|
|
|
|
|
|
sp = page_header(__pa(sptep));
|
|
|
|
if (sp->role.level > PT_PAGE_TABLE_LEVEL)
|
|
|
|
return;
|
|
|
|
|
|
|
|
__direct_pte_prefetch(vcpu, sp, sptep);
|
|
|
|
}
|
|
|
|
|
2008-12-25 20:54:25 +08:00
|
|
|
static int __direct_map(struct kvm_vcpu *vcpu, gpa_t v, int write,
|
2010-12-07 10:34:42 +08:00
|
|
|
int map_writable, int level, gfn_t gfn, pfn_t pfn,
|
|
|
|
bool prefault)
|
2008-08-23 00:28:04 +08:00
|
|
|
{
|
2008-12-25 20:54:25 +08:00
|
|
|
struct kvm_shadow_walk_iterator iterator;
|
2008-08-23 00:28:04 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
2011-07-12 03:25:56 +08:00
|
|
|
int emulate = 0;
|
2008-08-23 00:28:04 +08:00
|
|
|
gfn_t pseudo_gfn;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2008-12-25 20:54:25 +08:00
|
|
|
for_each_shadow_entry(vcpu, (u64)gfn << PAGE_SHIFT, iterator) {
|
2009-07-27 22:30:44 +08:00
|
|
|
if (iterator.level == level) {
|
2010-10-23 00:18:18 +08:00
|
|
|
unsigned pte_access = ACC_ALL;
|
|
|
|
|
|
|
|
mmu_set_spte(vcpu, iterator.sptep, ACC_ALL, pte_access,
|
2011-07-12 03:25:56 +08:00
|
|
|
0, write, &emulate,
|
2010-12-07 10:34:42 +08:00
|
|
|
level, gfn, pfn, prefault, map_writable);
|
2010-08-22 19:12:48 +08:00
|
|
|
direct_pte_prefetch(vcpu, iterator.sptep);
|
2008-12-25 20:54:25 +08:00
|
|
|
++vcpu->stat.pf_fixed;
|
|
|
|
break;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2011-07-12 03:28:04 +08:00
|
|
|
if (!is_shadow_present_pte(*iterator.sptep)) {
|
2010-05-26 16:48:25 +08:00
|
|
|
u64 base_addr = iterator.addr;
|
|
|
|
|
|
|
|
base_addr &= PT64_LVL_ADDR_MASK(iterator.level);
|
|
|
|
pseudo_gfn = base_addr >> PAGE_SHIFT;
|
2008-12-25 20:54:25 +08:00
|
|
|
sp = kvm_mmu_get_page(vcpu, pseudo_gfn, iterator.addr,
|
|
|
|
iterator.level - 1,
|
|
|
|
1, ACC_ALL, iterator.sptep);
|
2008-08-23 00:28:04 +08:00
|
|
|
|
2011-07-12 03:30:35 +08:00
|
|
|
mmu_spte_set(iterator.sptep,
|
|
|
|
__pa(sp->spt)
|
|
|
|
| PT_PRESENT_MASK | PT_WRITABLE_MASK
|
|
|
|
| shadow_user_mask | shadow_x_mask
|
|
|
|
| shadow_accessed_mask);
|
2008-12-25 20:54:25 +08:00
|
|
|
}
|
|
|
|
}
|
2011-07-12 03:25:56 +08:00
|
|
|
return emulate;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2010-10-08 16:24:15 +08:00
|
|
|
static void kvm_send_hwpoison_signal(unsigned long address, struct task_struct *tsk)
|
2010-05-31 14:28:19 +08:00
|
|
|
{
|
2010-10-08 16:24:15 +08:00
|
|
|
siginfo_t info;
|
|
|
|
|
|
|
|
info.si_signo = SIGBUS;
|
|
|
|
info.si_errno = 0;
|
|
|
|
info.si_code = BUS_MCEERR_AR;
|
|
|
|
info.si_addr = (void __user *)address;
|
|
|
|
info.si_addr_lsb = PAGE_SHIFT;
|
2010-05-31 14:28:19 +08:00
|
|
|
|
2010-10-08 16:24:15 +08:00
|
|
|
send_sig_info(SIGBUS, &info, tsk);
|
2010-05-31 14:28:19 +08:00
|
|
|
}
|
|
|
|
|
2011-07-12 03:29:38 +08:00
|
|
|
static int kvm_handle_bad_page(struct kvm_vcpu *vcpu, gfn_t gfn, pfn_t pfn)
|
2010-05-31 14:28:19 +08:00
|
|
|
{
|
2012-08-21 11:02:51 +08:00
|
|
|
/*
|
|
|
|
* Do not cache the mmio info caused by writing the readonly gfn
|
|
|
|
* into the spte otherwise read access on readonly gfn also can
|
|
|
|
* caused mmio page fault and treat it as mmio access.
|
|
|
|
* Return 1 to tell kvm to emulate it.
|
|
|
|
*/
|
|
|
|
if (pfn == KVM_PFN_ERR_RO_FAULT)
|
|
|
|
return 1;
|
|
|
|
|
2012-08-03 15:38:36 +08:00
|
|
|
if (pfn == KVM_PFN_ERR_HWPOISON) {
|
2011-07-12 03:23:20 +08:00
|
|
|
kvm_send_hwpoison_signal(gfn_to_hva(vcpu->kvm, gfn), current);
|
2010-05-31 14:28:19 +08:00
|
|
|
return 0;
|
2011-07-12 03:29:38 +08:00
|
|
|
}
|
2010-07-08 01:16:45 +08:00
|
|
|
|
2011-07-12 03:29:38 +08:00
|
|
|
return -EFAULT;
|
2010-05-31 14:28:19 +08:00
|
|
|
}
|
|
|
|
|
2011-01-14 07:46:48 +08:00
|
|
|
static void transparent_hugepage_adjust(struct kvm_vcpu *vcpu,
|
|
|
|
gfn_t *gfnp, pfn_t *pfnp, int *levelp)
|
|
|
|
{
|
|
|
|
pfn_t pfn = *pfnp;
|
|
|
|
gfn_t gfn = *gfnp;
|
|
|
|
int level = *levelp;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check if it's a transparent hugepage. If this would be an
|
|
|
|
* hugetlbfs page, level wouldn't be set to
|
|
|
|
* PT_PAGE_TABLE_LEVEL and there would be no adjustment done
|
|
|
|
* here.
|
|
|
|
*/
|
|
|
|
if (!is_error_pfn(pfn) && !kvm_is_mmio_pfn(pfn) &&
|
|
|
|
level == PT_PAGE_TABLE_LEVEL &&
|
|
|
|
PageTransCompound(pfn_to_page(pfn)) &&
|
|
|
|
!has_wrprotected_page(vcpu->kvm, gfn, PT_DIRECTORY_LEVEL)) {
|
|
|
|
unsigned long mask;
|
|
|
|
/*
|
|
|
|
* mmu_notifier_retry was successful and we hold the
|
|
|
|
* mmu_lock here, so the pmd can't become splitting
|
|
|
|
* from under us, and in turn
|
|
|
|
* __split_huge_page_refcount() can't run from under
|
|
|
|
* us and we can safely transfer the refcount from
|
|
|
|
* PG_tail to PG_head as we switch the pfn to tail to
|
|
|
|
* head.
|
|
|
|
*/
|
|
|
|
*levelp = level = PT_DIRECTORY_LEVEL;
|
|
|
|
mask = KVM_PAGES_PER_HPAGE(level) - 1;
|
|
|
|
VM_BUG_ON((gfn & mask) != (pfn & mask));
|
|
|
|
if (pfn & mask) {
|
|
|
|
gfn &= ~mask;
|
|
|
|
*gfnp = gfn;
|
|
|
|
kvm_release_pfn_clean(pfn);
|
|
|
|
pfn &= ~mask;
|
2012-05-28 14:10:43 +08:00
|
|
|
kvm_get_pfn(pfn);
|
2011-01-14 07:46:48 +08:00
|
|
|
*pfnp = pfn;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:29:38 +08:00
|
|
|
static bool handle_abnormal_pfn(struct kvm_vcpu *vcpu, gva_t gva, gfn_t gfn,
|
|
|
|
pfn_t pfn, unsigned access, int *ret_val)
|
|
|
|
{
|
|
|
|
bool ret = true;
|
|
|
|
|
|
|
|
/* The pfn is invalid, report the error! */
|
|
|
|
if (unlikely(is_invalid_pfn(pfn))) {
|
|
|
|
*ret_val = kvm_handle_bad_page(vcpu, gfn, pfn);
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:33:44 +08:00
|
|
|
if (unlikely(is_noslot_pfn(pfn)))
|
2011-07-12 03:29:38 +08:00
|
|
|
vcpu_cache_mmio_info(vcpu, gva, gfn, access);
|
|
|
|
|
|
|
|
ret = false;
|
|
|
|
exit:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2012-06-20 15:59:18 +08:00
|
|
|
static bool page_fault_can_be_fast(struct kvm_vcpu *vcpu, u32 error_code)
|
|
|
|
{
|
|
|
|
/*
|
|
|
|
* #PF can be fast only if the shadow page table is present and it
|
|
|
|
* is caused by write-protect, that means we just need change the
|
|
|
|
* W bit of the spte which can be done out of mmu-lock.
|
|
|
|
*/
|
|
|
|
if (!(error_code & PFERR_PRESENT_MASK) ||
|
|
|
|
!(error_code & PFERR_WRITE_MASK))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
fast_pf_fix_direct_spte(struct kvm_vcpu *vcpu, u64 *sptep, u64 spte)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *sp = page_header(__pa(sptep));
|
|
|
|
gfn_t gfn;
|
|
|
|
|
|
|
|
WARN_ON(!sp->role.direct);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* The gfn of direct spte is stable since it is calculated
|
|
|
|
* by sp->gfn.
|
|
|
|
*/
|
|
|
|
gfn = kvm_mmu_page_get_gfn(sp, sptep - sp->spt);
|
|
|
|
|
|
|
|
if (cmpxchg64(sptep, spte, spte | PT_WRITABLE_MASK) == spte)
|
|
|
|
mark_page_dirty(vcpu->kvm, gfn);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Return value:
|
|
|
|
* - true: let the vcpu to access on the same address again.
|
|
|
|
* - false: let the real page fault path to fix it.
|
|
|
|
*/
|
|
|
|
static bool fast_page_fault(struct kvm_vcpu *vcpu, gva_t gva, int level,
|
|
|
|
u32 error_code)
|
|
|
|
{
|
|
|
|
struct kvm_shadow_walk_iterator iterator;
|
|
|
|
bool ret = false;
|
|
|
|
u64 spte = 0ull;
|
|
|
|
|
|
|
|
if (!page_fault_can_be_fast(vcpu, error_code))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
walk_shadow_page_lockless_begin(vcpu);
|
|
|
|
for_each_shadow_entry_lockless(vcpu, gva, iterator, spte)
|
|
|
|
if (!is_shadow_present_pte(spte) || iterator.level < level)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the mapping has been changed, let the vcpu fault on the
|
|
|
|
* same address again.
|
|
|
|
*/
|
|
|
|
if (!is_rmap_spte(spte)) {
|
|
|
|
ret = true;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!is_last_spte(spte, level))
|
|
|
|
goto exit;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Check if it is a spurious fault caused by TLB lazily flushed.
|
|
|
|
*
|
|
|
|
* Need not check the access of upper level table entries since
|
|
|
|
* they are always ACC_ALL.
|
|
|
|
*/
|
|
|
|
if (is_writable_pte(spte)) {
|
|
|
|
ret = true;
|
|
|
|
goto exit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Currently, to simplify the code, only the spte write-protected
|
|
|
|
* by dirty-log can be fast fixed.
|
|
|
|
*/
|
|
|
|
if (!spte_is_locklessly_modifiable(spte))
|
|
|
|
goto exit;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Currently, fast page fault only works for direct mapping since
|
|
|
|
* the gfn is not stable for indirect shadow page.
|
|
|
|
* See Documentation/virtual/kvm/locking.txt to get more detail.
|
|
|
|
*/
|
|
|
|
ret = fast_pf_fix_direct_spte(vcpu, iterator.sptep, spte);
|
|
|
|
exit:
|
2012-06-20 15:59:41 +08:00
|
|
|
trace_fast_page_fault(vcpu, gva, error_code, iterator.sptep,
|
|
|
|
spte, ret);
|
2012-06-20 15:59:18 +08:00
|
|
|
walk_shadow_page_lockless_end(vcpu);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2010-12-07 10:48:06 +08:00
|
|
|
static bool try_async_pf(struct kvm_vcpu *vcpu, bool prefault, gfn_t gfn,
|
2010-11-12 14:49:11 +08:00
|
|
|
gva_t gva, pfn_t *pfn, bool write, bool *writable);
|
|
|
|
|
2012-06-20 15:59:18 +08:00
|
|
|
static int nonpaging_map(struct kvm_vcpu *vcpu, gva_t v, u32 error_code,
|
|
|
|
gfn_t gfn, bool prefault)
|
2007-12-21 08:18:22 +08:00
|
|
|
{
|
|
|
|
int r;
|
2009-07-27 22:30:44 +08:00
|
|
|
int level;
|
2011-01-14 07:46:48 +08:00
|
|
|
int force_pt_level;
|
2008-04-03 03:46:56 +08:00
|
|
|
pfn_t pfn;
|
2008-07-25 22:24:52 +08:00
|
|
|
unsigned long mmu_seq;
|
2012-06-20 15:59:18 +08:00
|
|
|
bool map_writable, write = error_code & PFERR_WRITE_MASK;
|
2007-12-21 08:18:26 +08:00
|
|
|
|
2011-01-14 07:46:48 +08:00
|
|
|
force_pt_level = mapping_level_dirty_bitmap(vcpu, gfn);
|
|
|
|
if (likely(!force_pt_level)) {
|
|
|
|
level = mapping_level(vcpu, gfn);
|
|
|
|
/*
|
|
|
|
* This path builds a PAE pagetable - so we can map
|
|
|
|
* 2mb pages at maximum. Therefore check if the level
|
|
|
|
* is larger than that.
|
|
|
|
*/
|
|
|
|
if (level > PT_DIRECTORY_LEVEL)
|
|
|
|
level = PT_DIRECTORY_LEVEL;
|
2009-07-27 22:30:44 +08:00
|
|
|
|
2011-01-14 07:46:48 +08:00
|
|
|
gfn &= ~(KVM_PAGES_PER_HPAGE(level) - 1);
|
|
|
|
} else
|
|
|
|
level = PT_PAGE_TABLE_LEVEL;
|
2008-02-23 22:44:30 +08:00
|
|
|
|
2012-06-20 15:59:18 +08:00
|
|
|
if (fast_page_fault(vcpu, v, level, error_code))
|
|
|
|
return 0;
|
|
|
|
|
2008-07-25 22:24:52 +08:00
|
|
|
mmu_seq = vcpu->kvm->mmu_notifier_seq;
|
2008-09-17 07:54:47 +08:00
|
|
|
smp_rmb();
|
2010-11-12 14:49:11 +08:00
|
|
|
|
2010-12-07 10:48:06 +08:00
|
|
|
if (try_async_pf(vcpu, prefault, gfn, v, &pfn, write, &map_writable))
|
2010-11-12 14:49:11 +08:00
|
|
|
return 0;
|
2007-12-21 08:18:26 +08:00
|
|
|
|
2011-07-12 03:29:38 +08:00
|
|
|
if (handle_abnormal_pfn(vcpu, v, gfn, pfn, ACC_ALL, &r))
|
|
|
|
return r;
|
2008-01-24 17:44:11 +08:00
|
|
|
|
2007-12-21 08:18:26 +08:00
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
2008-07-25 22:24:52 +08:00
|
|
|
if (mmu_notifier_retry(vcpu, mmu_seq))
|
|
|
|
goto out_unlock;
|
2007-12-31 21:27:49 +08:00
|
|
|
kvm_mmu_free_some_pages(vcpu);
|
2011-01-14 07:46:48 +08:00
|
|
|
if (likely(!force_pt_level))
|
|
|
|
transparent_hugepage_adjust(vcpu, &gfn, &pfn, &level);
|
2010-12-07 10:34:42 +08:00
|
|
|
r = __direct_map(vcpu, v, write, map_writable, level, gfn, pfn,
|
|
|
|
prefault);
|
2007-12-21 08:18:26 +08:00
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
|
|
|
|
|
|
|
|
2007-12-21 08:18:22 +08:00
|
|
|
return r;
|
2008-07-25 22:24:52 +08:00
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
|
|
|
kvm_release_pfn_clean(pfn);
|
|
|
|
return 0;
|
2007-12-21 08:18:22 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2007-01-06 08:36:40 +08:00
|
|
|
static void mmu_free_roots(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
int i;
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
2010-06-04 21:55:29 +08:00
|
|
|
LIST_HEAD(invalid_list);
|
2007-01-06 08:36:40 +08:00
|
|
|
|
2007-12-13 23:50:52 +08:00
|
|
|
if (!VALID_PAGE(vcpu->arch.mmu.root_hpa))
|
2007-06-05 17:17:03 +08:00
|
|
|
return;
|
2007-12-21 08:18:26 +08:00
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
2010-09-10 23:31:00 +08:00
|
|
|
if (vcpu->arch.mmu.shadow_root_level == PT64_ROOT_LEVEL &&
|
|
|
|
(vcpu->arch.mmu.root_level == PT64_ROOT_LEVEL ||
|
|
|
|
vcpu->arch.mmu.direct_map)) {
|
2007-12-13 23:50:52 +08:00
|
|
|
hpa_t root = vcpu->arch.mmu.root_hpa;
|
2007-01-06 08:36:40 +08:00
|
|
|
|
2007-11-21 21:28:32 +08:00
|
|
|
sp = page_header(root);
|
|
|
|
--sp->root_count;
|
2010-06-04 21:55:29 +08:00
|
|
|
if (!sp->root_count && sp->role.invalid) {
|
|
|
|
kvm_mmu_prepare_zap_page(vcpu->kvm, sp, &invalid_list);
|
|
|
|
kvm_mmu_commit_zap_page(vcpu->kvm, &invalid_list);
|
|
|
|
}
|
2007-12-13 23:50:52 +08:00
|
|
|
vcpu->arch.mmu.root_hpa = INVALID_PAGE;
|
2007-12-21 08:18:26 +08:00
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
2007-01-06 08:36:40 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
for (i = 0; i < 4; ++i) {
|
2007-12-13 23:50:52 +08:00
|
|
|
hpa_t root = vcpu->arch.mmu.pae_root[i];
|
2007-01-06 08:36:40 +08:00
|
|
|
|
2007-04-12 22:35:58 +08:00
|
|
|
if (root) {
|
|
|
|
root &= PT64_BASE_ADDR_MASK;
|
2007-11-21 21:28:32 +08:00
|
|
|
sp = page_header(root);
|
|
|
|
--sp->root_count;
|
2008-02-21 03:47:24 +08:00
|
|
|
if (!sp->root_count && sp->role.invalid)
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_prepare_zap_page(vcpu->kvm, sp,
|
|
|
|
&invalid_list);
|
2007-04-12 22:35:58 +08:00
|
|
|
}
|
2007-12-13 23:50:52 +08:00
|
|
|
vcpu->arch.mmu.pae_root[i] = INVALID_PAGE;
|
2007-01-06 08:36:40 +08:00
|
|
|
}
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_commit_zap_page(vcpu->kvm, &invalid_list);
|
2007-12-21 08:18:26 +08:00
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
2007-12-13 23:50:52 +08:00
|
|
|
vcpu->arch.mmu.root_hpa = INVALID_PAGE;
|
2007-01-06 08:36:40 +08:00
|
|
|
}
|
|
|
|
|
2009-05-13 05:55:45 +08:00
|
|
|
static int mmu_check_root(struct kvm_vcpu *vcpu, gfn_t root_gfn)
|
|
|
|
{
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
if (!kvm_is_visible_gfn(vcpu->kvm, root_gfn)) {
|
2010-05-10 17:34:53 +08:00
|
|
|
kvm_make_request(KVM_REQ_TRIPLE_FAULT, vcpu);
|
2009-05-13 05:55:45 +08:00
|
|
|
ret = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:59 +08:00
|
|
|
static int mmu_alloc_direct_roots(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
struct kvm_mmu_page *sp;
|
2010-10-04 00:51:39 +08:00
|
|
|
unsigned i;
|
2010-09-10 23:30:59 +08:00
|
|
|
|
|
|
|
if (vcpu->arch.mmu.shadow_root_level == PT64_ROOT_LEVEL) {
|
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
|
|
|
kvm_mmu_free_some_pages(vcpu);
|
|
|
|
sp = kvm_mmu_get_page(vcpu, 0, 0, PT64_ROOT_LEVEL,
|
|
|
|
1, ACC_ALL, NULL);
|
|
|
|
++sp->root_count;
|
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
|
|
|
vcpu->arch.mmu.root_hpa = __pa(sp->spt);
|
|
|
|
} else if (vcpu->arch.mmu.shadow_root_level == PT32E_ROOT_LEVEL) {
|
|
|
|
for (i = 0; i < 4; ++i) {
|
|
|
|
hpa_t root = vcpu->arch.mmu.pae_root[i];
|
|
|
|
|
|
|
|
ASSERT(!VALID_PAGE(root));
|
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
|
|
|
kvm_mmu_free_some_pages(vcpu);
|
2010-12-28 18:09:07 +08:00
|
|
|
sp = kvm_mmu_get_page(vcpu, i << (30 - PAGE_SHIFT),
|
|
|
|
i << 30,
|
2010-09-10 23:30:59 +08:00
|
|
|
PT32_ROOT_LEVEL, 1, ACC_ALL,
|
|
|
|
NULL);
|
|
|
|
root = __pa(sp->spt);
|
|
|
|
++sp->root_count;
|
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
|
|
|
vcpu->arch.mmu.pae_root[i] = root | PT_PRESENT_MASK;
|
|
|
|
}
|
2010-09-27 18:02:12 +08:00
|
|
|
vcpu->arch.mmu.root_hpa = __pa(vcpu->arch.mmu.pae_root);
|
2010-09-10 23:30:59 +08:00
|
|
|
} else
|
|
|
|
BUG();
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int mmu_alloc_shadow_roots(struct kvm_vcpu *vcpu)
|
2007-01-06 08:36:40 +08:00
|
|
|
{
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
2010-09-10 23:31:00 +08:00
|
|
|
u64 pdptr, pm_mask;
|
|
|
|
gfn_t root_gfn;
|
|
|
|
int i;
|
2007-01-06 08:36:51 +08:00
|
|
|
|
2010-09-10 23:30:42 +08:00
|
|
|
root_gfn = vcpu->arch.mmu.get_cr3(vcpu) >> PAGE_SHIFT;
|
2007-01-06 08:36:40 +08:00
|
|
|
|
2010-09-10 23:30:59 +08:00
|
|
|
if (mmu_check_root(vcpu, root_gfn))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Do we shadow a long mode page table? If so we need to
|
|
|
|
* write-protect the guests page table root.
|
|
|
|
*/
|
|
|
|
if (vcpu->arch.mmu.root_level == PT64_ROOT_LEVEL) {
|
2007-12-13 23:50:52 +08:00
|
|
|
hpa_t root = vcpu->arch.mmu.root_hpa;
|
2007-01-06 08:36:40 +08:00
|
|
|
|
|
|
|
ASSERT(!VALID_PAGE(root));
|
2010-09-10 23:30:59 +08:00
|
|
|
|
2010-05-04 17:58:32 +08:00
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
2010-05-13 08:00:35 +08:00
|
|
|
kvm_mmu_free_some_pages(vcpu);
|
2010-09-10 23:30:59 +08:00
|
|
|
sp = kvm_mmu_get_page(vcpu, root_gfn, 0, PT64_ROOT_LEVEL,
|
|
|
|
0, ACC_ALL, NULL);
|
2007-11-21 21:28:32 +08:00
|
|
|
root = __pa(sp->spt);
|
|
|
|
++sp->root_count;
|
2010-05-04 17:58:32 +08:00
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
2007-12-13 23:50:52 +08:00
|
|
|
vcpu->arch.mmu.root_hpa = root;
|
2009-05-13 05:55:45 +08:00
|
|
|
return 0;
|
2007-01-06 08:36:40 +08:00
|
|
|
}
|
2010-09-02 23:29:45 +08:00
|
|
|
|
2010-09-10 23:30:59 +08:00
|
|
|
/*
|
|
|
|
* We shadow a 32 bit page table. This may be a legacy 2-level
|
2010-09-10 23:31:00 +08:00
|
|
|
* or a PAE 3-level page table. In either case we need to be aware that
|
|
|
|
* the shadow page table may be a PAE or a long mode page table.
|
2010-09-10 23:30:59 +08:00
|
|
|
*/
|
2010-09-10 23:31:00 +08:00
|
|
|
pm_mask = PT_PRESENT_MASK;
|
|
|
|
if (vcpu->arch.mmu.shadow_root_level == PT64_ROOT_LEVEL)
|
|
|
|
pm_mask |= PT_ACCESSED_MASK | PT_WRITABLE_MASK | PT_USER_MASK;
|
|
|
|
|
2007-01-06 08:36:40 +08:00
|
|
|
for (i = 0; i < 4; ++i) {
|
2007-12-13 23:50:52 +08:00
|
|
|
hpa_t root = vcpu->arch.mmu.pae_root[i];
|
2007-01-06 08:36:40 +08:00
|
|
|
|
|
|
|
ASSERT(!VALID_PAGE(root));
|
2007-12-13 23:50:52 +08:00
|
|
|
if (vcpu->arch.mmu.root_level == PT32E_ROOT_LEVEL) {
|
2011-07-28 16:36:17 +08:00
|
|
|
pdptr = vcpu->arch.mmu.get_pdptr(vcpu, i);
|
2009-06-10 19:12:05 +08:00
|
|
|
if (!is_present_gpte(pdptr)) {
|
2007-12-13 23:50:52 +08:00
|
|
|
vcpu->arch.mmu.pae_root[i] = 0;
|
2007-04-12 22:35:58 +08:00
|
|
|
continue;
|
|
|
|
}
|
2009-06-01 03:58:47 +08:00
|
|
|
root_gfn = pdptr >> PAGE_SHIFT;
|
2010-09-02 23:29:45 +08:00
|
|
|
if (mmu_check_root(vcpu, root_gfn))
|
|
|
|
return 1;
|
2010-04-27 08:00:05 +08:00
|
|
|
}
|
2010-05-04 17:58:32 +08:00
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
2010-05-13 08:00:35 +08:00
|
|
|
kvm_mmu_free_some_pages(vcpu);
|
2007-11-21 21:28:32 +08:00
|
|
|
sp = kvm_mmu_get_page(vcpu, root_gfn, i << 30,
|
2010-09-10 23:30:59 +08:00
|
|
|
PT32_ROOT_LEVEL, 0,
|
2008-02-27 04:12:10 +08:00
|
|
|
ACC_ALL, NULL);
|
2007-11-21 21:28:32 +08:00
|
|
|
root = __pa(sp->spt);
|
|
|
|
++sp->root_count;
|
2010-05-04 17:58:32 +08:00
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
|
|
|
|
2010-09-10 23:31:00 +08:00
|
|
|
vcpu->arch.mmu.pae_root[i] = root | pm_mask;
|
2007-01-06 08:36:40 +08:00
|
|
|
}
|
2010-09-27 18:02:12 +08:00
|
|
|
vcpu->arch.mmu.root_hpa = __pa(vcpu->arch.mmu.pae_root);
|
2010-09-10 23:31:00 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If we shadow a 32 bit page table with a long mode page
|
|
|
|
* table we enter this path.
|
|
|
|
*/
|
|
|
|
if (vcpu->arch.mmu.shadow_root_level == PT64_ROOT_LEVEL) {
|
|
|
|
if (vcpu->arch.mmu.lm_root == NULL) {
|
|
|
|
/*
|
|
|
|
* The additional page necessary for this is only
|
|
|
|
* allocated on demand.
|
|
|
|
*/
|
|
|
|
|
|
|
|
u64 *lm_root;
|
|
|
|
|
|
|
|
lm_root = (void*)get_zeroed_page(GFP_KERNEL);
|
|
|
|
if (lm_root == NULL)
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
lm_root[0] = __pa(vcpu->arch.mmu.pae_root) | pm_mask;
|
|
|
|
|
|
|
|
vcpu->arch.mmu.lm_root = lm_root;
|
|
|
|
}
|
|
|
|
|
|
|
|
vcpu->arch.mmu.root_hpa = __pa(vcpu->arch.mmu.lm_root);
|
|
|
|
}
|
|
|
|
|
2009-05-13 05:55:45 +08:00
|
|
|
return 0;
|
2007-01-06 08:36:40 +08:00
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:59 +08:00
|
|
|
static int mmu_alloc_roots(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
if (vcpu->arch.mmu.direct_map)
|
|
|
|
return mmu_alloc_direct_roots(vcpu);
|
|
|
|
else
|
|
|
|
return mmu_alloc_shadow_roots(vcpu);
|
|
|
|
}
|
|
|
|
|
2008-09-24 00:18:34 +08:00
|
|
|
static void mmu_sync_roots(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
|
2010-09-10 23:31:00 +08:00
|
|
|
if (vcpu->arch.mmu.direct_map)
|
|
|
|
return;
|
|
|
|
|
2008-09-24 00:18:34 +08:00
|
|
|
if (!VALID_PAGE(vcpu->arch.mmu.root_hpa))
|
|
|
|
return;
|
2010-09-27 18:09:29 +08:00
|
|
|
|
2011-07-12 03:23:20 +08:00
|
|
|
vcpu_clear_mmio_info(vcpu, ~0ul);
|
2011-11-28 20:41:00 +08:00
|
|
|
kvm_mmu_audit(vcpu, AUDIT_PRE_SYNC);
|
2010-09-10 23:31:00 +08:00
|
|
|
if (vcpu->arch.mmu.root_level == PT64_ROOT_LEVEL) {
|
2008-09-24 00:18:34 +08:00
|
|
|
hpa_t root = vcpu->arch.mmu.root_hpa;
|
|
|
|
sp = page_header(root);
|
|
|
|
mmu_sync_children(vcpu, sp);
|
2011-11-28 20:41:00 +08:00
|
|
|
kvm_mmu_audit(vcpu, AUDIT_POST_SYNC);
|
2008-09-24 00:18:34 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
for (i = 0; i < 4; ++i) {
|
|
|
|
hpa_t root = vcpu->arch.mmu.pae_root[i];
|
|
|
|
|
2009-05-13 05:55:45 +08:00
|
|
|
if (root && VALID_PAGE(root)) {
|
2008-09-24 00:18:34 +08:00
|
|
|
root &= PT64_BASE_ADDR_MASK;
|
|
|
|
sp = page_header(root);
|
|
|
|
mmu_sync_children(vcpu, sp);
|
|
|
|
}
|
|
|
|
}
|
2011-11-28 20:41:00 +08:00
|
|
|
kvm_mmu_audit(vcpu, AUDIT_POST_SYNC);
|
2008-09-24 00:18:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_mmu_sync_roots(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
|
|
|
mmu_sync_roots(vcpu);
|
2008-12-02 08:32:04 +08:00
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
2008-09-24 00:18:34 +08:00
|
|
|
}
|
|
|
|
|
2010-02-10 20:21:32 +08:00
|
|
|
static gpa_t nonpaging_gva_to_gpa(struct kvm_vcpu *vcpu, gva_t vaddr,
|
2010-11-22 23:53:26 +08:00
|
|
|
u32 access, struct x86_exception *exception)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2010-11-22 23:53:26 +08:00
|
|
|
if (exception)
|
|
|
|
exception->error_code = 0;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
return vaddr;
|
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:50 +08:00
|
|
|
static gpa_t nonpaging_gva_to_gpa_nested(struct kvm_vcpu *vcpu, gva_t vaddr,
|
2010-11-22 23:53:26 +08:00
|
|
|
u32 access,
|
|
|
|
struct x86_exception *exception)
|
2010-09-10 23:30:50 +08:00
|
|
|
{
|
2010-11-22 23:53:26 +08:00
|
|
|
if (exception)
|
|
|
|
exception->error_code = 0;
|
2010-09-10 23:30:50 +08:00
|
|
|
return vcpu->arch.nested_mmu.translate_gpa(vcpu, vaddr, access);
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:33:44 +08:00
|
|
|
static bool quickly_check_mmio_pf(struct kvm_vcpu *vcpu, u64 addr, bool direct)
|
|
|
|
{
|
|
|
|
if (direct)
|
|
|
|
return vcpu_match_mmio_gpa(vcpu, addr);
|
|
|
|
|
|
|
|
return vcpu_match_mmio_gva(vcpu, addr);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/*
|
|
|
|
* On direct hosts, the last spte is only allows two states
|
|
|
|
* for mmio page fault:
|
|
|
|
* - It is the mmio spte
|
|
|
|
* - It is zapped or it is being zapped.
|
|
|
|
*
|
|
|
|
* This function completely checks the spte when the last spte
|
|
|
|
* is not the mmio spte.
|
|
|
|
*/
|
|
|
|
static bool check_direct_spte_mmio_pf(u64 spte)
|
|
|
|
{
|
|
|
|
return __check_direct_spte_mmio_pf(spte);
|
|
|
|
}
|
|
|
|
|
|
|
|
static u64 walk_shadow_page_get_mmio_spte(struct kvm_vcpu *vcpu, u64 addr)
|
|
|
|
{
|
|
|
|
struct kvm_shadow_walk_iterator iterator;
|
|
|
|
u64 spte = 0ull;
|
|
|
|
|
|
|
|
walk_shadow_page_lockless_begin(vcpu);
|
|
|
|
for_each_shadow_entry_lockless(vcpu, addr, iterator, spte)
|
|
|
|
if (!is_shadow_present_pte(spte))
|
|
|
|
break;
|
|
|
|
walk_shadow_page_lockless_end(vcpu);
|
|
|
|
|
|
|
|
return spte;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If it is a real mmio page fault, return 1 and emulat the instruction
|
|
|
|
* directly, return 0 to let CPU fault again on the address, -1 is
|
|
|
|
* returned if bug is detected.
|
|
|
|
*/
|
|
|
|
int handle_mmio_page_fault_common(struct kvm_vcpu *vcpu, u64 addr, bool direct)
|
|
|
|
{
|
|
|
|
u64 spte;
|
|
|
|
|
|
|
|
if (quickly_check_mmio_pf(vcpu, addr, direct))
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
spte = walk_shadow_page_get_mmio_spte(vcpu, addr);
|
|
|
|
|
|
|
|
if (is_mmio_spte(spte)) {
|
|
|
|
gfn_t gfn = get_mmio_spte_gfn(spte);
|
|
|
|
unsigned access = get_mmio_spte_access(spte);
|
|
|
|
|
|
|
|
if (direct)
|
|
|
|
addr = 0;
|
2011-07-12 03:34:24 +08:00
|
|
|
|
|
|
|
trace_handle_mmio_page_fault(addr, gfn, access);
|
2011-07-12 03:33:44 +08:00
|
|
|
vcpu_cache_mmio_info(vcpu, addr, gfn, access);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* It's ok if the gva is remapped by other cpus on shadow guest,
|
|
|
|
* it's a BUG if the gfn is not a mmio page.
|
|
|
|
*/
|
|
|
|
if (direct && !check_direct_spte_mmio_pf(spte))
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If the page table is zapped by other cpus, let CPU fault again on
|
|
|
|
* the address.
|
|
|
|
*/
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(handle_mmio_page_fault_common);
|
|
|
|
|
|
|
|
static int handle_mmio_page_fault(struct kvm_vcpu *vcpu, u64 addr,
|
|
|
|
u32 error_code, bool direct)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
ret = handle_mmio_page_fault_common(vcpu, addr, direct);
|
|
|
|
WARN_ON(ret < 0);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
static int nonpaging_page_fault(struct kvm_vcpu *vcpu, gva_t gva,
|
2010-12-07 10:48:06 +08:00
|
|
|
u32 error_code, bool prefault)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2007-12-10 00:43:00 +08:00
|
|
|
gfn_t gfn;
|
2007-01-06 08:36:54 +08:00
|
|
|
int r;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2008-03-04 04:59:56 +08:00
|
|
|
pgprintk("%s: gva %lx error %x\n", __func__, gva, error_code);
|
2011-07-12 03:33:44 +08:00
|
|
|
|
|
|
|
if (unlikely(error_code & PFERR_RSVD_MASK))
|
|
|
|
return handle_mmio_page_fault(vcpu, gva, error_code, true);
|
|
|
|
|
2007-01-06 08:36:54 +08:00
|
|
|
r = mmu_topup_memory_caches(vcpu);
|
|
|
|
if (r)
|
|
|
|
return r;
|
2007-01-06 08:36:53 +08:00
|
|
|
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
ASSERT(vcpu);
|
2007-12-13 23:50:52 +08:00
|
|
|
ASSERT(VALID_PAGE(vcpu->arch.mmu.root_hpa));
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2007-12-10 00:43:00 +08:00
|
|
|
gfn = gva >> PAGE_SHIFT;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2007-12-10 00:43:00 +08:00
|
|
|
return nonpaging_map(vcpu, gva & PAGE_MASK,
|
2012-06-20 15:59:18 +08:00
|
|
|
error_code, gfn, prefault);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2010-10-20 21:18:02 +08:00
|
|
|
static int kvm_arch_setup_async_pf(struct kvm_vcpu *vcpu, gva_t gva, gfn_t gfn)
|
2010-10-14 17:22:46 +08:00
|
|
|
{
|
|
|
|
struct kvm_arch_async_pf arch;
|
2010-12-07 10:35:25 +08:00
|
|
|
|
2010-10-14 17:22:53 +08:00
|
|
|
arch.token = (vcpu->arch.apf.id++ << 12) | vcpu->vcpu_id;
|
2010-10-14 17:22:46 +08:00
|
|
|
arch.gfn = gfn;
|
2010-11-12 14:49:55 +08:00
|
|
|
arch.direct_map = vcpu->arch.mmu.direct_map;
|
2010-12-07 10:35:25 +08:00
|
|
|
arch.cr3 = vcpu->arch.mmu.get_cr3(vcpu);
|
2010-10-14 17:22:46 +08:00
|
|
|
|
|
|
|
return kvm_setup_async_pf(vcpu, gva, gfn, &arch);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool can_do_async_pf(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
if (unlikely(!irqchip_in_kernel(vcpu->kvm) ||
|
|
|
|
kvm_event_needs_reinjection(vcpu)))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return kvm_x86_ops->interrupt_allowed(vcpu);
|
|
|
|
}
|
|
|
|
|
2010-12-07 10:48:06 +08:00
|
|
|
static bool try_async_pf(struct kvm_vcpu *vcpu, bool prefault, gfn_t gfn,
|
2010-10-23 00:18:18 +08:00
|
|
|
gva_t gva, pfn_t *pfn, bool write, bool *writable)
|
2010-10-14 17:22:46 +08:00
|
|
|
{
|
|
|
|
bool async;
|
|
|
|
|
2010-10-23 00:18:18 +08:00
|
|
|
*pfn = gfn_to_pfn_async(vcpu->kvm, gfn, &async, write, writable);
|
2010-10-14 17:22:46 +08:00
|
|
|
|
|
|
|
if (!async)
|
|
|
|
return false; /* *pfn has correct page already */
|
|
|
|
|
2010-12-07 10:48:06 +08:00
|
|
|
if (!prefault && can_do_async_pf(vcpu)) {
|
2010-11-01 16:58:43 +08:00
|
|
|
trace_kvm_try_async_get_page(gva, gfn);
|
2010-10-14 17:22:46 +08:00
|
|
|
if (kvm_find_async_pf_gfn(vcpu, gfn)) {
|
|
|
|
trace_kvm_async_pf_doublefault(gva, gfn);
|
|
|
|
kvm_make_request(KVM_REQ_APF_HALT, vcpu);
|
|
|
|
return true;
|
|
|
|
} else if (kvm_arch_setup_async_pf(vcpu, gva, gfn))
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-10-23 00:18:18 +08:00
|
|
|
*pfn = gfn_to_pfn_prot(vcpu->kvm, gfn, write, writable);
|
2010-10-14 17:22:46 +08:00
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2010-10-18 00:13:42 +08:00
|
|
|
static int tdp_page_fault(struct kvm_vcpu *vcpu, gva_t gpa, u32 error_code,
|
2010-12-07 10:48:06 +08:00
|
|
|
bool prefault)
|
2008-02-07 20:47:44 +08:00
|
|
|
{
|
2008-04-03 03:46:56 +08:00
|
|
|
pfn_t pfn;
|
2008-02-07 20:47:44 +08:00
|
|
|
int r;
|
2009-07-27 22:30:44 +08:00
|
|
|
int level;
|
2011-01-14 07:46:48 +08:00
|
|
|
int force_pt_level;
|
2008-02-23 22:44:30 +08:00
|
|
|
gfn_t gfn = gpa >> PAGE_SHIFT;
|
2008-07-25 22:24:52 +08:00
|
|
|
unsigned long mmu_seq;
|
2010-10-23 00:18:18 +08:00
|
|
|
int write = error_code & PFERR_WRITE_MASK;
|
|
|
|
bool map_writable;
|
2008-02-07 20:47:44 +08:00
|
|
|
|
|
|
|
ASSERT(vcpu);
|
|
|
|
ASSERT(VALID_PAGE(vcpu->arch.mmu.root_hpa));
|
|
|
|
|
2011-07-12 03:33:44 +08:00
|
|
|
if (unlikely(error_code & PFERR_RSVD_MASK))
|
|
|
|
return handle_mmio_page_fault(vcpu, gpa, error_code, true);
|
|
|
|
|
2008-02-07 20:47:44 +08:00
|
|
|
r = mmu_topup_memory_caches(vcpu);
|
|
|
|
if (r)
|
|
|
|
return r;
|
|
|
|
|
2011-01-14 07:46:48 +08:00
|
|
|
force_pt_level = mapping_level_dirty_bitmap(vcpu, gfn);
|
|
|
|
if (likely(!force_pt_level)) {
|
|
|
|
level = mapping_level(vcpu, gfn);
|
|
|
|
gfn &= ~(KVM_PAGES_PER_HPAGE(level) - 1);
|
|
|
|
} else
|
|
|
|
level = PT_PAGE_TABLE_LEVEL;
|
2009-07-27 22:30:44 +08:00
|
|
|
|
2012-06-20 15:59:18 +08:00
|
|
|
if (fast_page_fault(vcpu, gpa, level, error_code))
|
|
|
|
return 0;
|
|
|
|
|
2008-07-25 22:24:52 +08:00
|
|
|
mmu_seq = vcpu->kvm->mmu_notifier_seq;
|
2008-09-17 07:54:47 +08:00
|
|
|
smp_rmb();
|
2010-10-14 17:22:46 +08:00
|
|
|
|
2010-12-07 10:48:06 +08:00
|
|
|
if (try_async_pf(vcpu, prefault, gfn, gpa, &pfn, write, &map_writable))
|
2010-10-14 17:22:46 +08:00
|
|
|
return 0;
|
|
|
|
|
2011-07-12 03:29:38 +08:00
|
|
|
if (handle_abnormal_pfn(vcpu, 0, gfn, pfn, ACC_ALL, &r))
|
|
|
|
return r;
|
|
|
|
|
2008-02-07 20:47:44 +08:00
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
2008-07-25 22:24:52 +08:00
|
|
|
if (mmu_notifier_retry(vcpu, mmu_seq))
|
|
|
|
goto out_unlock;
|
2008-02-07 20:47:44 +08:00
|
|
|
kvm_mmu_free_some_pages(vcpu);
|
2011-01-14 07:46:48 +08:00
|
|
|
if (likely(!force_pt_level))
|
|
|
|
transparent_hugepage_adjust(vcpu, &gfn, &pfn, &level);
|
2010-10-23 00:18:18 +08:00
|
|
|
r = __direct_map(vcpu, gpa, write, map_writable,
|
2010-12-07 10:34:42 +08:00
|
|
|
level, gfn, pfn, prefault);
|
2008-02-07 20:47:44 +08:00
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
|
|
|
|
|
|
|
return r;
|
2008-07-25 22:24:52 +08:00
|
|
|
|
|
|
|
out_unlock:
|
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
|
|
|
kvm_release_pfn_clean(pfn);
|
|
|
|
return 0;
|
2008-02-07 20:47:44 +08:00
|
|
|
}
|
|
|
|
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
static void nonpaging_free(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2007-01-06 08:36:40 +08:00
|
|
|
mmu_free_roots(vcpu);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:44 +08:00
|
|
|
static int nonpaging_init_context(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu *context)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
|
|
|
context->new_cr3 = nonpaging_new_cr3;
|
|
|
|
context->page_fault = nonpaging_page_fault;
|
|
|
|
context->gva_to_gpa = nonpaging_gva_to_gpa;
|
|
|
|
context->free = nonpaging_free;
|
2008-09-24 00:18:33 +08:00
|
|
|
context->sync_page = nonpaging_sync_page;
|
2008-09-24 00:18:35 +08:00
|
|
|
context->invlpg = nonpaging_invlpg;
|
2011-03-09 15:43:51 +08:00
|
|
|
context->update_pte = nonpaging_update_pte;
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
context->root_level = 0;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
context->shadow_root_level = PT32E_ROOT_LEVEL;
|
2007-06-04 20:58:30 +08:00
|
|
|
context->root_hpa = INVALID_PAGE;
|
2010-09-10 23:30:39 +08:00
|
|
|
context->direct_map = true;
|
2010-09-10 23:31:01 +08:00
|
|
|
context->nx = false;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-11-21 08:57:59 +08:00
|
|
|
void kvm_mmu_flush_tlb(struct kvm_vcpu *vcpu)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2007-04-19 22:27:43 +08:00
|
|
|
++vcpu->stat.tlb_flush;
|
2010-05-10 17:34:53 +08:00
|
|
|
kvm_make_request(KVM_REQ_TLB_FLUSH, vcpu);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void paging_new_cr3(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2010-12-05 23:30:00 +08:00
|
|
|
pgprintk("%s: cr3 %lx\n", __func__, kvm_read_cr3(vcpu));
|
[PATCH] KVM: MMU: Shadow page table caching
Define a hashtable for caching shadow page tables. Look up the cache on
context switch (cr3 change) or during page faults.
The key to the cache is a combination of
- the guest page table frame number
- the number of paging levels in the guest
* we can cache real mode, 32-bit mode, pae, and long mode page
tables simultaneously. this is useful for smp bootup.
- the guest page table table
* some kernels use a page as both a page table and a page directory. this
allows multiple shadow pages to exist for that page, one per level
- the "quadrant"
* 32-bit mode page tables span 4MB, whereas a shadow page table spans
2MB. similarly, a 32-bit page directory spans 4GB, while a shadow
page directory spans 1GB. the quadrant allows caching up to 4 shadow page
tables for one guest page in one level.
- a "metaphysical" bit
* for real mode, and for pse pages, there is no guest page table, so set
the bit to avoid write protecting the page.
Signed-off-by: Avi Kivity <avi@qumranet.com>
Acked-by: Ingo Molnar <mingo@elte.hu>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2007-01-06 08:36:43 +08:00
|
|
|
mmu_free_roots(vcpu);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:42 +08:00
|
|
|
static unsigned long get_cr3(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2010-12-05 23:30:00 +08:00
|
|
|
return kvm_read_cr3(vcpu);
|
2010-09-10 23:30:42 +08:00
|
|
|
}
|
|
|
|
|
2010-11-29 22:12:30 +08:00
|
|
|
static void inject_page_fault(struct kvm_vcpu *vcpu,
|
|
|
|
struct x86_exception *fault)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2010-11-29 22:12:30 +08:00
|
|
|
vcpu->arch.mmu.inject_page_fault(vcpu, fault);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void paging_free(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
nonpaging_free(vcpu);
|
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:45 +08:00
|
|
|
static bool is_rsvd_bits_set(struct kvm_mmu *mmu, u64 gpte, int level)
|
2009-03-30 16:21:08 +08:00
|
|
|
{
|
|
|
|
int bit7;
|
|
|
|
|
|
|
|
bit7 = (gpte >> 7) & 1;
|
2010-09-10 23:30:45 +08:00
|
|
|
return (gpte & mmu->rsvd_bits_mask[bit7][level-1]) != 0;
|
2009-03-30 16:21:08 +08:00
|
|
|
}
|
|
|
|
|
2012-09-12 18:44:53 +08:00
|
|
|
static inline void protect_clean_gpte(unsigned *access, unsigned gpte)
|
|
|
|
{
|
|
|
|
unsigned mask;
|
|
|
|
|
|
|
|
BUILD_BUG_ON(PT_WRITABLE_MASK != ACC_WRITE_MASK);
|
|
|
|
|
|
|
|
mask = (unsigned)~ACC_WRITE_MASK;
|
|
|
|
/* Allow write access to dirty gptes */
|
|
|
|
mask |= (gpte >> (PT_DIRTY_SHIFT - PT_WRITABLE_SHIFT)) & PT_WRITABLE_MASK;
|
|
|
|
*access &= mask;
|
|
|
|
}
|
|
|
|
|
2011-07-12 03:33:44 +08:00
|
|
|
static bool sync_mmio_spte(u64 *sptep, gfn_t gfn, unsigned access,
|
|
|
|
int *nr_present)
|
|
|
|
{
|
|
|
|
if (unlikely(is_mmio_spte(*sptep))) {
|
|
|
|
if (gfn != get_mmio_spte_gfn(*sptep)) {
|
|
|
|
mmu_spte_clear_no_track(sptep);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
(*nr_present)++;
|
|
|
|
mark_mmio_spte(sptep, gfn, access);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2012-09-12 19:03:28 +08:00
|
|
|
static inline unsigned gpte_access(struct kvm_vcpu *vcpu, u64 gpte)
|
|
|
|
{
|
|
|
|
unsigned access;
|
|
|
|
|
|
|
|
access = (gpte & (PT_WRITABLE_MASK | PT_USER_MASK)) | ACC_EXEC_MASK;
|
|
|
|
access &= ~(gpte >> PT64_NX_SHIFT);
|
|
|
|
|
|
|
|
return access;
|
|
|
|
}
|
|
|
|
|
2012-09-13 01:46:56 +08:00
|
|
|
static inline bool is_last_gpte(struct kvm_mmu *mmu, unsigned level, unsigned gpte)
|
|
|
|
{
|
|
|
|
unsigned index;
|
|
|
|
|
|
|
|
index = level - 1;
|
|
|
|
index |= (gpte & PT_PAGE_SIZE_MASK) >> (PT_PAGE_SIZE_SHIFT - 2);
|
|
|
|
return mmu->last_pte_bitmap & (1 << index);
|
|
|
|
}
|
|
|
|
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
#define PTTYPE 64
|
|
|
|
#include "paging_tmpl.h"
|
|
|
|
#undef PTTYPE
|
|
|
|
|
|
|
|
#define PTTYPE 32
|
|
|
|
#include "paging_tmpl.h"
|
|
|
|
#undef PTTYPE
|
|
|
|
|
2010-09-10 23:30:44 +08:00
|
|
|
static void reset_rsvds_bits_mask(struct kvm_vcpu *vcpu,
|
2012-03-05 23:53:06 +08:00
|
|
|
struct kvm_mmu *context)
|
2009-03-30 16:21:08 +08:00
|
|
|
{
|
|
|
|
int maxphyaddr = cpuid_maxphyaddr(vcpu);
|
|
|
|
u64 exb_bit_rsvd = 0;
|
|
|
|
|
2010-09-10 23:31:01 +08:00
|
|
|
if (!context->nx)
|
2009-03-30 16:21:08 +08:00
|
|
|
exb_bit_rsvd = rsvd_bits(63, 63);
|
2012-03-05 23:53:06 +08:00
|
|
|
switch (context->root_level) {
|
2009-03-30 16:21:08 +08:00
|
|
|
case PT32_ROOT_LEVEL:
|
|
|
|
/* no rsvd bits for 2 level 4K page table entries */
|
|
|
|
context->rsvd_bits_mask[0][1] = 0;
|
|
|
|
context->rsvd_bits_mask[0][0] = 0;
|
2010-03-19 17:58:53 +08:00
|
|
|
context->rsvd_bits_mask[1][0] = context->rsvd_bits_mask[0][0];
|
|
|
|
|
|
|
|
if (!is_pse(vcpu)) {
|
|
|
|
context->rsvd_bits_mask[1][1] = 0;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2009-03-30 16:21:08 +08:00
|
|
|
if (is_cpuid_PSE36())
|
|
|
|
/* 36bits PSE 4MB page */
|
|
|
|
context->rsvd_bits_mask[1][1] = rsvd_bits(17, 21);
|
|
|
|
else
|
|
|
|
/* 32 bits PSE 4MB page */
|
|
|
|
context->rsvd_bits_mask[1][1] = rsvd_bits(13, 21);
|
|
|
|
break;
|
|
|
|
case PT32E_ROOT_LEVEL:
|
2009-03-31 23:03:45 +08:00
|
|
|
context->rsvd_bits_mask[0][2] =
|
|
|
|
rsvd_bits(maxphyaddr, 63) |
|
|
|
|
rsvd_bits(7, 8) | rsvd_bits(1, 2); /* PDPTE */
|
2009-03-30 16:21:08 +08:00
|
|
|
context->rsvd_bits_mask[0][1] = exb_bit_rsvd |
|
2009-04-02 10:28:37 +08:00
|
|
|
rsvd_bits(maxphyaddr, 62); /* PDE */
|
2009-03-30 16:21:08 +08:00
|
|
|
context->rsvd_bits_mask[0][0] = exb_bit_rsvd |
|
|
|
|
rsvd_bits(maxphyaddr, 62); /* PTE */
|
|
|
|
context->rsvd_bits_mask[1][1] = exb_bit_rsvd |
|
|
|
|
rsvd_bits(maxphyaddr, 62) |
|
|
|
|
rsvd_bits(13, 20); /* large page */
|
2010-03-19 17:58:53 +08:00
|
|
|
context->rsvd_bits_mask[1][0] = context->rsvd_bits_mask[0][0];
|
2009-03-30 16:21:08 +08:00
|
|
|
break;
|
|
|
|
case PT64_ROOT_LEVEL:
|
|
|
|
context->rsvd_bits_mask[0][3] = exb_bit_rsvd |
|
|
|
|
rsvd_bits(maxphyaddr, 51) | rsvd_bits(7, 8);
|
|
|
|
context->rsvd_bits_mask[0][2] = exb_bit_rsvd |
|
|
|
|
rsvd_bits(maxphyaddr, 51) | rsvd_bits(7, 8);
|
|
|
|
context->rsvd_bits_mask[0][1] = exb_bit_rsvd |
|
2009-04-02 10:28:37 +08:00
|
|
|
rsvd_bits(maxphyaddr, 51);
|
2009-03-30 16:21:08 +08:00
|
|
|
context->rsvd_bits_mask[0][0] = exb_bit_rsvd |
|
|
|
|
rsvd_bits(maxphyaddr, 51);
|
|
|
|
context->rsvd_bits_mask[1][3] = context->rsvd_bits_mask[0][3];
|
2009-07-27 22:30:45 +08:00
|
|
|
context->rsvd_bits_mask[1][2] = exb_bit_rsvd |
|
|
|
|
rsvd_bits(maxphyaddr, 51) |
|
|
|
|
rsvd_bits(13, 29);
|
2009-03-30 16:21:08 +08:00
|
|
|
context->rsvd_bits_mask[1][1] = exb_bit_rsvd |
|
2009-04-02 10:28:37 +08:00
|
|
|
rsvd_bits(maxphyaddr, 51) |
|
|
|
|
rsvd_bits(13, 20); /* large page */
|
2010-03-19 17:58:53 +08:00
|
|
|
context->rsvd_bits_mask[1][0] = context->rsvd_bits_mask[0][0];
|
2009-03-30 16:21:08 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
KVM: MMU: Optimize pte permission checks
walk_addr_generic() permission checks are a maze of branchy code, which is
performed four times per lookup. It depends on the type of access, efer.nxe,
cr0.wp, cr4.smep, and in the near future, cr4.smap.
Optimize this away by precalculating all variants and storing them in a
bitmap. The bitmap is recalculated when rarely-changing variables change
(cr0, cr4) and is indexed by the often-changing variables (page fault error
code, pte access permissions).
The permission check is moved to the end of the loop, otherwise an SMEP
fault could be reported as a false positive, when PDE.U=1 but PTE.U=0.
Noted by Xiao Guangrong.
The result is short, branch-free code.
Reviewed-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2012-09-12 19:52:00 +08:00
|
|
|
static void update_permission_bitmask(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu)
|
|
|
|
{
|
|
|
|
unsigned bit, byte, pfec;
|
|
|
|
u8 map;
|
|
|
|
bool fault, x, w, u, wf, uf, ff, smep;
|
|
|
|
|
|
|
|
smep = kvm_read_cr4_bits(vcpu, X86_CR4_SMEP);
|
|
|
|
for (byte = 0; byte < ARRAY_SIZE(mmu->permissions); ++byte) {
|
|
|
|
pfec = byte << 1;
|
|
|
|
map = 0;
|
|
|
|
wf = pfec & PFERR_WRITE_MASK;
|
|
|
|
uf = pfec & PFERR_USER_MASK;
|
|
|
|
ff = pfec & PFERR_FETCH_MASK;
|
|
|
|
for (bit = 0; bit < 8; ++bit) {
|
|
|
|
x = bit & ACC_EXEC_MASK;
|
|
|
|
w = bit & ACC_WRITE_MASK;
|
|
|
|
u = bit & ACC_USER_MASK;
|
|
|
|
|
|
|
|
/* Not really needed: !nx will cause pte.nx to fault */
|
|
|
|
x |= !mmu->nx;
|
|
|
|
/* Allow supervisor writes if !cr0.wp */
|
|
|
|
w |= !is_write_protection(vcpu) && !uf;
|
|
|
|
/* Disallow supervisor fetches of user code if cr4.smep */
|
|
|
|
x &= !(smep && u && !uf);
|
|
|
|
|
|
|
|
fault = (ff && !x) || (uf && !u) || (wf && !w);
|
|
|
|
map |= fault << bit;
|
|
|
|
}
|
|
|
|
mmu->permissions[byte] = map;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-09-13 01:46:56 +08:00
|
|
|
static void update_last_pte_bitmap(struct kvm_vcpu *vcpu, struct kvm_mmu *mmu)
|
|
|
|
{
|
|
|
|
u8 map;
|
|
|
|
unsigned level, root_level = mmu->root_level;
|
|
|
|
const unsigned ps_set_index = 1 << 2; /* bit 2 of index: ps */
|
|
|
|
|
|
|
|
if (root_level == PT32E_ROOT_LEVEL)
|
|
|
|
--root_level;
|
|
|
|
/* PT_PAGE_TABLE_LEVEL always terminates */
|
|
|
|
map = 1 | (1 << ps_set_index);
|
|
|
|
for (level = PT_DIRECTORY_LEVEL; level <= root_level; ++level) {
|
|
|
|
if (level <= PT_PDPE_LEVEL
|
|
|
|
&& (mmu->root_level >= PT32E_ROOT_LEVEL || is_pse(vcpu)))
|
|
|
|
map |= 1 << (ps_set_index | (level - 1));
|
|
|
|
}
|
|
|
|
mmu->last_pte_bitmap = map;
|
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:44 +08:00
|
|
|
static int paging64_init_context_common(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu *context,
|
|
|
|
int level)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2010-09-10 23:31:01 +08:00
|
|
|
context->nx = is_nx(vcpu);
|
2012-03-05 23:53:06 +08:00
|
|
|
context->root_level = level;
|
2010-09-10 23:31:01 +08:00
|
|
|
|
2012-03-05 23:53:06 +08:00
|
|
|
reset_rsvds_bits_mask(vcpu, context);
|
KVM: MMU: Optimize pte permission checks
walk_addr_generic() permission checks are a maze of branchy code, which is
performed four times per lookup. It depends on the type of access, efer.nxe,
cr0.wp, cr4.smep, and in the near future, cr4.smap.
Optimize this away by precalculating all variants and storing them in a
bitmap. The bitmap is recalculated when rarely-changing variables change
(cr0, cr4) and is indexed by the often-changing variables (page fault error
code, pte access permissions).
The permission check is moved to the end of the loop, otherwise an SMEP
fault could be reported as a false positive, when PDE.U=1 but PTE.U=0.
Noted by Xiao Guangrong.
The result is short, branch-free code.
Reviewed-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2012-09-12 19:52:00 +08:00
|
|
|
update_permission_bitmask(vcpu, context);
|
2012-09-13 01:46:56 +08:00
|
|
|
update_last_pte_bitmap(vcpu, context);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
|
|
|
ASSERT(is_pae(vcpu));
|
|
|
|
context->new_cr3 = paging_new_cr3;
|
|
|
|
context->page_fault = paging64_page_fault;
|
|
|
|
context->gva_to_gpa = paging64_gva_to_gpa;
|
2008-09-24 00:18:33 +08:00
|
|
|
context->sync_page = paging64_sync_page;
|
2008-09-24 00:18:35 +08:00
|
|
|
context->invlpg = paging64_invlpg;
|
2011-03-09 15:43:51 +08:00
|
|
|
context->update_pte = paging64_update_pte;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
context->free = paging_free;
|
2007-01-06 08:36:40 +08:00
|
|
|
context->shadow_root_level = level;
|
2007-06-04 20:58:30 +08:00
|
|
|
context->root_hpa = INVALID_PAGE;
|
2010-09-10 23:30:39 +08:00
|
|
|
context->direct_map = false;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:44 +08:00
|
|
|
static int paging64_init_context(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu *context)
|
2007-01-06 08:36:40 +08:00
|
|
|
{
|
2010-09-10 23:30:44 +08:00
|
|
|
return paging64_init_context_common(vcpu, context, PT64_ROOT_LEVEL);
|
2007-01-06 08:36:40 +08:00
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:44 +08:00
|
|
|
static int paging32_init_context(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu *context)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2010-09-10 23:31:01 +08:00
|
|
|
context->nx = false;
|
2012-03-05 23:53:06 +08:00
|
|
|
context->root_level = PT32_ROOT_LEVEL;
|
2010-09-10 23:31:01 +08:00
|
|
|
|
2012-03-05 23:53:06 +08:00
|
|
|
reset_rsvds_bits_mask(vcpu, context);
|
KVM: MMU: Optimize pte permission checks
walk_addr_generic() permission checks are a maze of branchy code, which is
performed four times per lookup. It depends on the type of access, efer.nxe,
cr0.wp, cr4.smep, and in the near future, cr4.smap.
Optimize this away by precalculating all variants and storing them in a
bitmap. The bitmap is recalculated when rarely-changing variables change
(cr0, cr4) and is indexed by the often-changing variables (page fault error
code, pte access permissions).
The permission check is moved to the end of the loop, otherwise an SMEP
fault could be reported as a false positive, when PDE.U=1 but PTE.U=0.
Noted by Xiao Guangrong.
The result is short, branch-free code.
Reviewed-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2012-09-12 19:52:00 +08:00
|
|
|
update_permission_bitmask(vcpu, context);
|
2012-09-13 01:46:56 +08:00
|
|
|
update_last_pte_bitmap(vcpu, context);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
|
|
|
context->new_cr3 = paging_new_cr3;
|
|
|
|
context->page_fault = paging32_page_fault;
|
|
|
|
context->gva_to_gpa = paging32_gva_to_gpa;
|
|
|
|
context->free = paging_free;
|
2008-09-24 00:18:33 +08:00
|
|
|
context->sync_page = paging32_sync_page;
|
2008-09-24 00:18:35 +08:00
|
|
|
context->invlpg = paging32_invlpg;
|
2011-03-09 15:43:51 +08:00
|
|
|
context->update_pte = paging32_update_pte;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
context->shadow_root_level = PT32E_ROOT_LEVEL;
|
2007-06-04 20:58:30 +08:00
|
|
|
context->root_hpa = INVALID_PAGE;
|
2010-09-10 23:30:39 +08:00
|
|
|
context->direct_map = false;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:44 +08:00
|
|
|
static int paging32E_init_context(struct kvm_vcpu *vcpu,
|
|
|
|
struct kvm_mmu *context)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2010-09-10 23:30:44 +08:00
|
|
|
return paging64_init_context_common(vcpu, context, PT32E_ROOT_LEVEL);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2008-02-07 20:47:44 +08:00
|
|
|
static int init_kvm_tdp_mmu(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2010-09-10 23:30:49 +08:00
|
|
|
struct kvm_mmu *context = vcpu->arch.walk_mmu;
|
2008-02-07 20:47:44 +08:00
|
|
|
|
2010-12-21 22:26:01 +08:00
|
|
|
context->base_role.word = 0;
|
2008-02-07 20:47:44 +08:00
|
|
|
context->new_cr3 = nonpaging_new_cr3;
|
|
|
|
context->page_fault = tdp_page_fault;
|
|
|
|
context->free = nonpaging_free;
|
2008-09-24 00:18:33 +08:00
|
|
|
context->sync_page = nonpaging_sync_page;
|
2008-09-24 00:18:35 +08:00
|
|
|
context->invlpg = nonpaging_invlpg;
|
2011-03-09 15:43:51 +08:00
|
|
|
context->update_pte = nonpaging_update_pte;
|
2008-04-25 10:20:22 +08:00
|
|
|
context->shadow_root_level = kvm_x86_ops->get_tdp_level();
|
2008-02-07 20:47:44 +08:00
|
|
|
context->root_hpa = INVALID_PAGE;
|
2010-09-10 23:30:39 +08:00
|
|
|
context->direct_map = true;
|
2010-09-10 23:30:41 +08:00
|
|
|
context->set_cr3 = kvm_x86_ops->set_tdp_cr3;
|
2010-09-10 23:30:42 +08:00
|
|
|
context->get_cr3 = get_cr3;
|
2011-07-28 16:36:17 +08:00
|
|
|
context->get_pdptr = kvm_pdptr_read;
|
2010-09-10 23:30:43 +08:00
|
|
|
context->inject_page_fault = kvm_inject_page_fault;
|
2008-02-07 20:47:44 +08:00
|
|
|
|
|
|
|
if (!is_paging(vcpu)) {
|
2010-09-10 23:31:01 +08:00
|
|
|
context->nx = false;
|
2008-02-07 20:47:44 +08:00
|
|
|
context->gva_to_gpa = nonpaging_gva_to_gpa;
|
|
|
|
context->root_level = 0;
|
|
|
|
} else if (is_long_mode(vcpu)) {
|
2010-09-10 23:31:01 +08:00
|
|
|
context->nx = is_nx(vcpu);
|
2008-02-07 20:47:44 +08:00
|
|
|
context->root_level = PT64_ROOT_LEVEL;
|
2012-03-05 23:53:06 +08:00
|
|
|
reset_rsvds_bits_mask(vcpu, context);
|
|
|
|
context->gva_to_gpa = paging64_gva_to_gpa;
|
2008-02-07 20:47:44 +08:00
|
|
|
} else if (is_pae(vcpu)) {
|
2010-09-10 23:31:01 +08:00
|
|
|
context->nx = is_nx(vcpu);
|
2008-02-07 20:47:44 +08:00
|
|
|
context->root_level = PT32E_ROOT_LEVEL;
|
2012-03-05 23:53:06 +08:00
|
|
|
reset_rsvds_bits_mask(vcpu, context);
|
|
|
|
context->gva_to_gpa = paging64_gva_to_gpa;
|
2008-02-07 20:47:44 +08:00
|
|
|
} else {
|
2010-09-10 23:31:01 +08:00
|
|
|
context->nx = false;
|
2008-02-07 20:47:44 +08:00
|
|
|
context->root_level = PT32_ROOT_LEVEL;
|
2012-03-05 23:53:06 +08:00
|
|
|
reset_rsvds_bits_mask(vcpu, context);
|
|
|
|
context->gva_to_gpa = paging32_gva_to_gpa;
|
2008-02-07 20:47:44 +08:00
|
|
|
}
|
|
|
|
|
KVM: MMU: Optimize pte permission checks
walk_addr_generic() permission checks are a maze of branchy code, which is
performed four times per lookup. It depends on the type of access, efer.nxe,
cr0.wp, cr4.smep, and in the near future, cr4.smap.
Optimize this away by precalculating all variants and storing them in a
bitmap. The bitmap is recalculated when rarely-changing variables change
(cr0, cr4) and is indexed by the often-changing variables (page fault error
code, pte access permissions).
The permission check is moved to the end of the loop, otherwise an SMEP
fault could be reported as a false positive, when PDE.U=1 but PTE.U=0.
Noted by Xiao Guangrong.
The result is short, branch-free code.
Reviewed-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2012-09-12 19:52:00 +08:00
|
|
|
update_permission_bitmask(vcpu, context);
|
2012-09-13 01:46:56 +08:00
|
|
|
update_last_pte_bitmap(vcpu, context);
|
KVM: MMU: Optimize pte permission checks
walk_addr_generic() permission checks are a maze of branchy code, which is
performed four times per lookup. It depends on the type of access, efer.nxe,
cr0.wp, cr4.smep, and in the near future, cr4.smap.
Optimize this away by precalculating all variants and storing them in a
bitmap. The bitmap is recalculated when rarely-changing variables change
(cr0, cr4) and is indexed by the often-changing variables (page fault error
code, pte access permissions).
The permission check is moved to the end of the loop, otherwise an SMEP
fault could be reported as a false positive, when PDE.U=1 but PTE.U=0.
Noted by Xiao Guangrong.
The result is short, branch-free code.
Reviewed-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2012-09-12 19:52:00 +08:00
|
|
|
|
2008-02-07 20:47:44 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:44 +08:00
|
|
|
int kvm_init_shadow_mmu(struct kvm_vcpu *vcpu, struct kvm_mmu *context)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2008-12-22 01:20:09 +08:00
|
|
|
int r;
|
2011-06-06 21:11:54 +08:00
|
|
|
bool smep = kvm_read_cr4_bits(vcpu, X86_CR4_SMEP);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
ASSERT(vcpu);
|
2007-12-13 23:50:52 +08:00
|
|
|
ASSERT(!VALID_PAGE(vcpu->arch.mmu.root_hpa));
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
|
|
|
if (!is_paging(vcpu))
|
2010-09-10 23:30:44 +08:00
|
|
|
r = nonpaging_init_context(vcpu, context);
|
2006-12-30 08:49:37 +08:00
|
|
|
else if (is_long_mode(vcpu))
|
2010-09-10 23:30:44 +08:00
|
|
|
r = paging64_init_context(vcpu, context);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
else if (is_pae(vcpu))
|
2010-09-10 23:30:44 +08:00
|
|
|
r = paging32E_init_context(vcpu, context);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
else
|
2010-09-10 23:30:44 +08:00
|
|
|
r = paging32_init_context(vcpu, context);
|
2008-12-22 01:20:09 +08:00
|
|
|
|
2010-04-15 00:20:03 +08:00
|
|
|
vcpu->arch.mmu.base_role.cr4_pae = !!is_pae(vcpu);
|
2010-09-10 23:30:40 +08:00
|
|
|
vcpu->arch.mmu.base_role.cr0_wp = is_write_protection(vcpu);
|
2011-06-06 21:11:54 +08:00
|
|
|
vcpu->arch.mmu.base_role.smep_andnot_wp
|
|
|
|
= smep && !is_write_protection(vcpu);
|
2010-09-10 23:30:44 +08:00
|
|
|
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_init_shadow_mmu);
|
|
|
|
|
|
|
|
static int init_kvm_softmmu(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2010-09-10 23:30:49 +08:00
|
|
|
int r = kvm_init_shadow_mmu(vcpu, vcpu->arch.walk_mmu);
|
2010-09-10 23:30:44 +08:00
|
|
|
|
2010-09-10 23:30:49 +08:00
|
|
|
vcpu->arch.walk_mmu->set_cr3 = kvm_x86_ops->set_cr3;
|
|
|
|
vcpu->arch.walk_mmu->get_cr3 = get_cr3;
|
2011-07-28 16:36:17 +08:00
|
|
|
vcpu->arch.walk_mmu->get_pdptr = kvm_pdptr_read;
|
2010-09-10 23:30:49 +08:00
|
|
|
vcpu->arch.walk_mmu->inject_page_fault = kvm_inject_page_fault;
|
2008-12-22 01:20:09 +08:00
|
|
|
|
|
|
|
return r;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2010-09-10 23:30:54 +08:00
|
|
|
static int init_kvm_nested_mmu(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
struct kvm_mmu *g_context = &vcpu->arch.nested_mmu;
|
|
|
|
|
|
|
|
g_context->get_cr3 = get_cr3;
|
2011-07-28 16:36:17 +08:00
|
|
|
g_context->get_pdptr = kvm_pdptr_read;
|
2010-09-10 23:30:54 +08:00
|
|
|
g_context->inject_page_fault = kvm_inject_page_fault;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Note that arch.mmu.gva_to_gpa translates l2_gva to l1_gpa. The
|
|
|
|
* translation of l2_gpa to l1_gpa addresses is done using the
|
|
|
|
* arch.nested_mmu.gva_to_gpa function. Basically the gva_to_gpa
|
|
|
|
* functions between mmu and nested_mmu are swapped.
|
|
|
|
*/
|
|
|
|
if (!is_paging(vcpu)) {
|
2010-09-10 23:31:01 +08:00
|
|
|
g_context->nx = false;
|
2010-09-10 23:30:54 +08:00
|
|
|
g_context->root_level = 0;
|
|
|
|
g_context->gva_to_gpa = nonpaging_gva_to_gpa_nested;
|
|
|
|
} else if (is_long_mode(vcpu)) {
|
2010-09-10 23:31:01 +08:00
|
|
|
g_context->nx = is_nx(vcpu);
|
2010-09-10 23:30:54 +08:00
|
|
|
g_context->root_level = PT64_ROOT_LEVEL;
|
2012-03-05 23:53:06 +08:00
|
|
|
reset_rsvds_bits_mask(vcpu, g_context);
|
2010-09-10 23:30:54 +08:00
|
|
|
g_context->gva_to_gpa = paging64_gva_to_gpa_nested;
|
|
|
|
} else if (is_pae(vcpu)) {
|
2010-09-10 23:31:01 +08:00
|
|
|
g_context->nx = is_nx(vcpu);
|
2010-09-10 23:30:54 +08:00
|
|
|
g_context->root_level = PT32E_ROOT_LEVEL;
|
2012-03-05 23:53:06 +08:00
|
|
|
reset_rsvds_bits_mask(vcpu, g_context);
|
2010-09-10 23:30:54 +08:00
|
|
|
g_context->gva_to_gpa = paging64_gva_to_gpa_nested;
|
|
|
|
} else {
|
2010-09-10 23:31:01 +08:00
|
|
|
g_context->nx = false;
|
2010-09-10 23:30:54 +08:00
|
|
|
g_context->root_level = PT32_ROOT_LEVEL;
|
2012-03-05 23:53:06 +08:00
|
|
|
reset_rsvds_bits_mask(vcpu, g_context);
|
2010-09-10 23:30:54 +08:00
|
|
|
g_context->gva_to_gpa = paging32_gva_to_gpa_nested;
|
|
|
|
}
|
|
|
|
|
KVM: MMU: Optimize pte permission checks
walk_addr_generic() permission checks are a maze of branchy code, which is
performed four times per lookup. It depends on the type of access, efer.nxe,
cr0.wp, cr4.smep, and in the near future, cr4.smap.
Optimize this away by precalculating all variants and storing them in a
bitmap. The bitmap is recalculated when rarely-changing variables change
(cr0, cr4) and is indexed by the often-changing variables (page fault error
code, pte access permissions).
The permission check is moved to the end of the loop, otherwise an SMEP
fault could be reported as a false positive, when PDE.U=1 but PTE.U=0.
Noted by Xiao Guangrong.
The result is short, branch-free code.
Reviewed-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2012-09-12 19:52:00 +08:00
|
|
|
update_permission_bitmask(vcpu, g_context);
|
2012-09-13 01:46:56 +08:00
|
|
|
update_last_pte_bitmap(vcpu, g_context);
|
KVM: MMU: Optimize pte permission checks
walk_addr_generic() permission checks are a maze of branchy code, which is
performed four times per lookup. It depends on the type of access, efer.nxe,
cr0.wp, cr4.smep, and in the near future, cr4.smap.
Optimize this away by precalculating all variants and storing them in a
bitmap. The bitmap is recalculated when rarely-changing variables change
(cr0, cr4) and is indexed by the often-changing variables (page fault error
code, pte access permissions).
The permission check is moved to the end of the loop, otherwise an SMEP
fault could be reported as a false positive, when PDE.U=1 but PTE.U=0.
Noted by Xiao Guangrong.
The result is short, branch-free code.
Reviewed-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2012-09-12 19:52:00 +08:00
|
|
|
|
2010-09-10 23:30:54 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-02-07 20:47:44 +08:00
|
|
|
static int init_kvm_mmu(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2010-09-10 23:30:54 +08:00
|
|
|
if (mmu_is_nested(vcpu))
|
|
|
|
return init_kvm_nested_mmu(vcpu);
|
|
|
|
else if (tdp_enabled)
|
2008-02-07 20:47:44 +08:00
|
|
|
return init_kvm_tdp_mmu(vcpu);
|
|
|
|
else
|
|
|
|
return init_kvm_softmmu(vcpu);
|
|
|
|
}
|
|
|
|
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
static void destroy_kvm_mmu(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
ASSERT(vcpu);
|
2010-05-12 16:40:41 +08:00
|
|
|
if (VALID_PAGE(vcpu->arch.mmu.root_hpa))
|
|
|
|
/* mmu.free() should set root_hpa = INVALID_PAGE */
|
2007-12-13 23:50:52 +08:00
|
|
|
vcpu->arch.mmu.free(vcpu);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_mmu_reset_context(struct kvm_vcpu *vcpu)
|
2007-06-04 20:58:30 +08:00
|
|
|
{
|
|
|
|
destroy_kvm_mmu(vcpu);
|
2011-06-22 01:00:10 +08:00
|
|
|
return init_kvm_mmu(vcpu);
|
2007-06-04 20:58:30 +08:00
|
|
|
}
|
2007-10-10 14:26:45 +08:00
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_reset_context);
|
2007-06-04 20:58:30 +08:00
|
|
|
|
|
|
|
int kvm_mmu_load(struct kvm_vcpu *vcpu)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2007-01-06 08:36:53 +08:00
|
|
|
int r;
|
|
|
|
|
2007-01-06 08:36:54 +08:00
|
|
|
r = mmu_topup_memory_caches(vcpu);
|
2007-06-04 20:58:30 +08:00
|
|
|
if (r)
|
|
|
|
goto out;
|
2009-05-13 05:55:45 +08:00
|
|
|
r = mmu_alloc_roots(vcpu);
|
2010-05-04 17:58:32 +08:00
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
2008-09-24 00:18:34 +08:00
|
|
|
mmu_sync_roots(vcpu);
|
2007-12-21 08:18:26 +08:00
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
2009-05-13 05:55:45 +08:00
|
|
|
if (r)
|
|
|
|
goto out;
|
2009-07-09 17:00:42 +08:00
|
|
|
/* set_cr3() should ensure TLB has been flushed */
|
2010-09-10 23:30:40 +08:00
|
|
|
vcpu->arch.mmu.set_cr3(vcpu, vcpu->arch.mmu.root_hpa);
|
2007-01-06 08:36:53 +08:00
|
|
|
out:
|
|
|
|
return r;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
2007-06-04 20:58:30 +08:00
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_load);
|
|
|
|
|
|
|
|
void kvm_mmu_unload(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
mmu_free_roots(vcpu);
|
|
|
|
}
|
2010-09-10 23:31:03 +08:00
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_unload);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2007-05-01 21:53:31 +08:00
|
|
|
static void mmu_pte_write_new_pte(struct kvm_vcpu *vcpu,
|
2011-03-28 10:29:27 +08:00
|
|
|
struct kvm_mmu_page *sp, u64 *spte,
|
|
|
|
const void *new)
|
2007-05-01 21:53:31 +08:00
|
|
|
{
|
2008-06-12 07:32:40 +08:00
|
|
|
if (sp->role.level != PT_PAGE_TABLE_LEVEL) {
|
2009-07-27 22:30:46 +08:00
|
|
|
++vcpu->kvm->stat.mmu_pde_zapped;
|
|
|
|
return;
|
2008-06-12 07:32:40 +08:00
|
|
|
}
|
2007-05-01 21:53:31 +08:00
|
|
|
|
2007-11-18 22:37:07 +08:00
|
|
|
++vcpu->kvm->stat.mmu_pte_updated;
|
2011-03-28 10:29:27 +08:00
|
|
|
vcpu->arch.mmu.update_pte(vcpu, sp, spte, new);
|
2007-05-01 21:53:31 +08:00
|
|
|
}
|
|
|
|
|
2007-11-21 08:06:21 +08:00
|
|
|
static bool need_remote_flush(u64 old, u64 new)
|
|
|
|
{
|
|
|
|
if (!is_shadow_present_pte(old))
|
|
|
|
return false;
|
|
|
|
if (!is_shadow_present_pte(new))
|
|
|
|
return true;
|
|
|
|
if ((old ^ new) & PT64_BASE_ADDR_MASK)
|
|
|
|
return true;
|
|
|
|
old ^= PT64_NX_MASK;
|
|
|
|
new ^= PT64_NX_MASK;
|
|
|
|
return (old & ~new & PT64_PERM_MASK) != 0;
|
|
|
|
}
|
|
|
|
|
2010-06-04 21:56:59 +08:00
|
|
|
static void mmu_pte_write_flush_tlb(struct kvm_vcpu *vcpu, bool zap_page,
|
|
|
|
bool remote_flush, bool local_flush)
|
2007-11-21 08:06:21 +08:00
|
|
|
{
|
2010-06-04 21:56:59 +08:00
|
|
|
if (zap_page)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (remote_flush)
|
2007-11-21 08:06:21 +08:00
|
|
|
kvm_flush_remote_tlbs(vcpu->kvm);
|
2010-06-04 21:56:59 +08:00
|
|
|
else if (local_flush)
|
2007-11-21 08:06:21 +08:00
|
|
|
kvm_mmu_flush_tlb(vcpu);
|
|
|
|
}
|
|
|
|
|
2011-09-22 16:57:23 +08:00
|
|
|
static u64 mmu_pte_write_fetch_gpte(struct kvm_vcpu *vcpu, gpa_t *gpa,
|
|
|
|
const u8 *new, int *bytes)
|
2007-01-06 08:36:44 +08:00
|
|
|
{
|
2011-09-22 16:57:23 +08:00
|
|
|
u64 gentry;
|
|
|
|
int r;
|
2010-03-15 19:59:53 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Assume that the pte write on a page table of the same type
|
2011-03-04 19:00:00 +08:00
|
|
|
* as the current vcpu paging mode since we update the sptes only
|
|
|
|
* when they have the same mode.
|
2010-03-15 19:59:53 +08:00
|
|
|
*/
|
2011-09-22 16:57:23 +08:00
|
|
|
if (is_pae(vcpu) && *bytes == 4) {
|
2010-03-15 19:59:53 +08:00
|
|
|
/* Handle a 32-bit guest writing two halves of a 64-bit gpte */
|
2011-09-22 16:57:23 +08:00
|
|
|
*gpa &= ~(gpa_t)7;
|
|
|
|
*bytes = 8;
|
|
|
|
r = kvm_read_guest(vcpu->kvm, *gpa, &gentry, min(*bytes, 8));
|
2010-03-15 19:59:53 +08:00
|
|
|
if (r)
|
|
|
|
gentry = 0;
|
2010-03-15 19:59:57 +08:00
|
|
|
new = (const u8 *)&gentry;
|
|
|
|
}
|
|
|
|
|
2011-09-22 16:57:23 +08:00
|
|
|
switch (*bytes) {
|
2010-03-15 19:59:57 +08:00
|
|
|
case 4:
|
|
|
|
gentry = *(const u32 *)new;
|
|
|
|
break;
|
|
|
|
case 8:
|
|
|
|
gentry = *(const u64 *)new;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
gentry = 0;
|
|
|
|
break;
|
2010-03-15 19:59:53 +08:00
|
|
|
}
|
|
|
|
|
2011-09-22 16:57:23 +08:00
|
|
|
return gentry;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* If we're seeing too many writes to a page, it may no longer be a page table,
|
|
|
|
* or we may be forking, in which case it is better to unmap the page.
|
|
|
|
*/
|
2011-12-16 18:18:10 +08:00
|
|
|
static bool detect_write_flooding(struct kvm_mmu_page *sp)
|
2011-09-22 16:57:23 +08:00
|
|
|
{
|
KVM: MMU: improve write flooding detected
Detecting write-flooding does not work well, when we handle page written, if
the last speculative spte is not accessed, we treat the page is
write-flooding, however, we can speculative spte on many path, such as pte
prefetch, page synced, that means the last speculative spte may be not point
to the written page and the written page can be accessed via other sptes, so
depends on the Accessed bit of the last speculative spte is not enough
Instead of detected page accessed, we can detect whether the spte is accessed
after it is written, if the spte is not accessed but it is written frequently,
we treat is not a page table or it not used for a long time
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-09-22 16:58:36 +08:00
|
|
|
/*
|
|
|
|
* Skip write-flooding detected for the sp whose level is 1, because
|
|
|
|
* it can become unsync, then the guest page is not write-protected.
|
|
|
|
*/
|
2012-04-18 18:24:29 +08:00
|
|
|
if (sp->role.level == PT_PAGE_TABLE_LEVEL)
|
KVM: MMU: improve write flooding detected
Detecting write-flooding does not work well, when we handle page written, if
the last speculative spte is not accessed, we treat the page is
write-flooding, however, we can speculative spte on many path, such as pte
prefetch, page synced, that means the last speculative spte may be not point
to the written page and the written page can be accessed via other sptes, so
depends on the Accessed bit of the last speculative spte is not enough
Instead of detected page accessed, we can detect whether the spte is accessed
after it is written, if the spte is not accessed but it is written frequently,
we treat is not a page table or it not used for a long time
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-09-22 16:58:36 +08:00
|
|
|
return false;
|
2010-04-16 16:35:54 +08:00
|
|
|
|
KVM: MMU: improve write flooding detected
Detecting write-flooding does not work well, when we handle page written, if
the last speculative spte is not accessed, we treat the page is
write-flooding, however, we can speculative spte on many path, such as pte
prefetch, page synced, that means the last speculative spte may be not point
to the written page and the written page can be accessed via other sptes, so
depends on the Accessed bit of the last speculative spte is not enough
Instead of detected page accessed, we can detect whether the spte is accessed
after it is written, if the spte is not accessed but it is written frequently,
we treat is not a page table or it not used for a long time
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-09-22 16:58:36 +08:00
|
|
|
return ++sp->write_flooding_count >= 3;
|
2011-09-22 16:57:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Misaligned accesses are too much trouble to fix up; also, they usually
|
|
|
|
* indicate a page is not used as a page table.
|
|
|
|
*/
|
|
|
|
static bool detect_write_misaligned(struct kvm_mmu_page *sp, gpa_t gpa,
|
|
|
|
int bytes)
|
|
|
|
{
|
|
|
|
unsigned offset, pte_size, misaligned;
|
|
|
|
|
|
|
|
pgprintk("misaligned: gpa %llx bytes %d role %x\n",
|
|
|
|
gpa, bytes, sp->role.word);
|
|
|
|
|
|
|
|
offset = offset_in_page(gpa);
|
|
|
|
pte_size = sp->role.cr4_pae ? 8 : 4;
|
2011-09-22 16:57:55 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Sometimes, the OS only writes the last one bytes to update status
|
|
|
|
* bits, for example, in linux, andb instruction is used in clear_bit().
|
|
|
|
*/
|
|
|
|
if (!(offset & (pte_size - 1)) && bytes == 1)
|
|
|
|
return false;
|
|
|
|
|
2011-09-22 16:57:23 +08:00
|
|
|
misaligned = (offset ^ (offset + bytes - 1)) & ~(pte_size - 1);
|
|
|
|
misaligned |= bytes < 4;
|
|
|
|
|
|
|
|
return misaligned;
|
|
|
|
}
|
|
|
|
|
|
|
|
static u64 *get_written_sptes(struct kvm_mmu_page *sp, gpa_t gpa, int *nspte)
|
|
|
|
{
|
|
|
|
unsigned page_offset, quadrant;
|
|
|
|
u64 *spte;
|
|
|
|
int level;
|
|
|
|
|
|
|
|
page_offset = offset_in_page(gpa);
|
|
|
|
level = sp->role.level;
|
|
|
|
*nspte = 1;
|
|
|
|
if (!sp->role.cr4_pae) {
|
|
|
|
page_offset <<= 1; /* 32->64 */
|
|
|
|
/*
|
|
|
|
* A 32-bit pde maps 4MB while the shadow pdes map
|
|
|
|
* only 2MB. So we need to double the offset again
|
|
|
|
* and zap two pdes instead of one.
|
|
|
|
*/
|
|
|
|
if (level == PT32_ROOT_LEVEL) {
|
|
|
|
page_offset &= ~7; /* kill rounding error */
|
|
|
|
page_offset <<= 1;
|
|
|
|
*nspte = 2;
|
|
|
|
}
|
|
|
|
quadrant = page_offset >> PAGE_SHIFT;
|
|
|
|
page_offset &= ~PAGE_MASK;
|
|
|
|
if (quadrant != sp->role.quadrant)
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
spte = &sp->spt[page_offset / sizeof(*spte)];
|
|
|
|
return spte;
|
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_mmu_pte_write(struct kvm_vcpu *vcpu, gpa_t gpa,
|
|
|
|
const u8 *new, int bytes)
|
|
|
|
{
|
|
|
|
gfn_t gfn = gpa >> PAGE_SHIFT;
|
|
|
|
union kvm_mmu_page_role mask = { .word = 0 };
|
|
|
|
struct kvm_mmu_page *sp;
|
|
|
|
struct hlist_node *node;
|
|
|
|
LIST_HEAD(invalid_list);
|
|
|
|
u64 entry, gentry, *spte;
|
|
|
|
int npte;
|
KVM: MMU: improve write flooding detected
Detecting write-flooding does not work well, when we handle page written, if
the last speculative spte is not accessed, we treat the page is
write-flooding, however, we can speculative spte on many path, such as pte
prefetch, page synced, that means the last speculative spte may be not point
to the written page and the written page can be accessed via other sptes, so
depends on the Accessed bit of the last speculative spte is not enough
Instead of detected page accessed, we can detect whether the spte is accessed
after it is written, if the spte is not accessed but it is written frequently,
we treat is not a page table or it not used for a long time
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-09-22 16:58:36 +08:00
|
|
|
bool remote_flush, local_flush, zap_page;
|
2011-09-22 16:57:23 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* If we don't have indirect shadow pages, it means no page is
|
|
|
|
* write-protected, so we can exit simply.
|
|
|
|
*/
|
|
|
|
if (!ACCESS_ONCE(vcpu->kvm->arch.indirect_shadow_pages))
|
|
|
|
return;
|
|
|
|
|
|
|
|
zap_page = remote_flush = local_flush = false;
|
|
|
|
|
|
|
|
pgprintk("%s: gpa %llx bytes %d\n", __func__, gpa, bytes);
|
|
|
|
|
|
|
|
gentry = mmu_pte_write_fetch_gpte(vcpu, &gpa, new, &bytes);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* No need to care whether allocation memory is successful
|
|
|
|
* or not since pte prefetch is skiped if it does not have
|
|
|
|
* enough objects in the cache.
|
|
|
|
*/
|
|
|
|
mmu_topup_memory_caches(vcpu);
|
|
|
|
|
|
|
|
spin_lock(&vcpu->kvm->mmu_lock);
|
|
|
|
++vcpu->kvm->stat.mmu_pte_write;
|
2011-11-28 20:41:00 +08:00
|
|
|
kvm_mmu_audit(vcpu, AUDIT_PRE_PTE_WRITE);
|
2011-09-22 16:57:23 +08:00
|
|
|
|
2010-07-16 11:19:51 +08:00
|
|
|
mask.cr0_wp = mask.cr4_pae = mask.nxe = 1;
|
2010-06-04 21:56:11 +08:00
|
|
|
for_each_gfn_indirect_valid_sp(vcpu->kvm, sp, gfn, node) {
|
KVM: MMU: improve write flooding detected
Detecting write-flooding does not work well, when we handle page written, if
the last speculative spte is not accessed, we treat the page is
write-flooding, however, we can speculative spte on many path, such as pte
prefetch, page synced, that means the last speculative spte may be not point
to the written page and the written page can be accessed via other sptes, so
depends on the Accessed bit of the last speculative spte is not enough
Instead of detected page accessed, we can detect whether the spte is accessed
after it is written, if the spte is not accessed but it is written frequently,
we treat is not a page table or it not used for a long time
Signed-off-by: Xiao Guangrong <xiaoguangrong@cn.fujitsu.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2011-09-22 16:58:36 +08:00
|
|
|
if (detect_write_misaligned(sp, gpa, bytes) ||
|
2011-12-16 18:18:10 +08:00
|
|
|
detect_write_flooding(sp)) {
|
2010-06-04 21:56:59 +08:00
|
|
|
zap_page |= !!kvm_mmu_prepare_zap_page(vcpu->kvm, sp,
|
2010-06-04 21:56:11 +08:00
|
|
|
&invalid_list);
|
2007-11-18 22:37:07 +08:00
|
|
|
++vcpu->kvm->stat.mmu_flooded;
|
2007-01-06 08:36:48 +08:00
|
|
|
continue;
|
|
|
|
}
|
2011-09-22 16:57:23 +08:00
|
|
|
|
|
|
|
spte = get_written_sptes(sp, gpa, &npte);
|
|
|
|
if (!spte)
|
|
|
|
continue;
|
|
|
|
|
2010-06-04 21:56:59 +08:00
|
|
|
local_flush = true;
|
2007-03-08 23:13:32 +08:00
|
|
|
while (npte--) {
|
2007-11-21 08:06:21 +08:00
|
|
|
entry = *spte;
|
2011-05-15 23:27:52 +08:00
|
|
|
mmu_page_zap_pte(vcpu->kvm, sp, spte);
|
2010-07-16 11:19:51 +08:00
|
|
|
if (gentry &&
|
|
|
|
!((sp->role.word ^ vcpu->arch.mmu.base_role.word)
|
2011-09-22 16:53:17 +08:00
|
|
|
& mask.word) && rmap_can_add(vcpu))
|
2011-03-28 10:29:27 +08:00
|
|
|
mmu_pte_write_new_pte(vcpu, sp, spte, &gentry);
|
2010-06-04 21:56:59 +08:00
|
|
|
if (!remote_flush && need_remote_flush(entry, *spte))
|
|
|
|
remote_flush = true;
|
2007-03-08 23:13:32 +08:00
|
|
|
++spte;
|
2007-01-06 08:36:45 +08:00
|
|
|
}
|
|
|
|
}
|
2010-06-04 21:56:59 +08:00
|
|
|
mmu_pte_write_flush_tlb(vcpu, zap_page, remote_flush, local_flush);
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_commit_zap_page(vcpu->kvm, &invalid_list);
|
2011-11-28 20:41:00 +08:00
|
|
|
kvm_mmu_audit(vcpu, AUDIT_POST_PTE_WRITE);
|
2007-12-21 08:18:26 +08:00
|
|
|
spin_unlock(&vcpu->kvm->mmu_lock);
|
2007-01-06 08:36:44 +08:00
|
|
|
}
|
|
|
|
|
2007-01-06 08:36:45 +08:00
|
|
|
int kvm_mmu_unprotect_page_virt(struct kvm_vcpu *vcpu, gva_t gva)
|
|
|
|
{
|
2007-12-21 08:18:22 +08:00
|
|
|
gpa_t gpa;
|
|
|
|
int r;
|
2007-01-06 08:36:45 +08:00
|
|
|
|
2010-09-10 23:30:39 +08:00
|
|
|
if (vcpu->arch.mmu.direct_map)
|
2009-08-27 18:37:06 +08:00
|
|
|
return 0;
|
|
|
|
|
2010-02-10 20:21:32 +08:00
|
|
|
gpa = kvm_mmu_gva_to_gpa_read(vcpu, gva, NULL);
|
2007-12-21 08:18:22 +08:00
|
|
|
|
|
|
|
r = kvm_mmu_unprotect_page(vcpu->kvm, gpa >> PAGE_SHIFT);
|
2011-09-22 17:02:48 +08:00
|
|
|
|
2007-12-21 08:18:22 +08:00
|
|
|
return r;
|
2007-01-06 08:36:45 +08:00
|
|
|
}
|
2008-07-19 13:57:05 +08:00
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_unprotect_page_virt);
|
2007-01-06 08:36:45 +08:00
|
|
|
|
2007-09-15 01:26:06 +08:00
|
|
|
void __kvm_mmu_free_some_pages(struct kvm_vcpu *vcpu)
|
2007-01-06 08:36:47 +08:00
|
|
|
{
|
2010-06-04 21:55:29 +08:00
|
|
|
LIST_HEAD(invalid_list);
|
2010-06-04 21:54:38 +08:00
|
|
|
|
2010-08-20 09:11:05 +08:00
|
|
|
while (kvm_mmu_available_pages(vcpu->kvm) < KVM_REFILL_PAGES &&
|
2009-07-29 02:26:58 +08:00
|
|
|
!list_empty(&vcpu->kvm->arch.active_mmu_pages)) {
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
2007-01-06 08:36:47 +08:00
|
|
|
|
2007-12-14 10:01:48 +08:00
|
|
|
sp = container_of(vcpu->kvm->arch.active_mmu_pages.prev,
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page, link);
|
2010-08-20 09:11:05 +08:00
|
|
|
kvm_mmu_prepare_zap_page(vcpu->kvm, sp, &invalid_list);
|
2007-11-18 22:37:07 +08:00
|
|
|
++vcpu->kvm->stat.mmu_recycled;
|
2007-01-06 08:36:47 +08:00
|
|
|
}
|
2011-07-12 03:26:40 +08:00
|
|
|
kvm_mmu_commit_zap_page(vcpu->kvm, &invalid_list);
|
2007-01-06 08:36:47 +08:00
|
|
|
}
|
|
|
|
|
2011-09-22 17:02:48 +08:00
|
|
|
static bool is_mmio_page_fault(struct kvm_vcpu *vcpu, gva_t addr)
|
|
|
|
{
|
|
|
|
if (vcpu->arch.mmu.direct_map || mmu_is_nested(vcpu))
|
|
|
|
return vcpu_match_mmio_gpa(vcpu, addr);
|
|
|
|
|
|
|
|
return vcpu_match_mmio_gva(vcpu, addr);
|
|
|
|
}
|
|
|
|
|
2010-12-21 18:12:07 +08:00
|
|
|
int kvm_mmu_page_fault(struct kvm_vcpu *vcpu, gva_t cr2, u32 error_code,
|
|
|
|
void *insn, int insn_len)
|
2007-10-29 00:48:59 +08:00
|
|
|
{
|
2011-09-22 17:02:48 +08:00
|
|
|
int r, emulation_type = EMULTYPE_RETRY;
|
2007-10-29 00:48:59 +08:00
|
|
|
enum emulation_result er;
|
|
|
|
|
2010-10-18 00:13:42 +08:00
|
|
|
r = vcpu->arch.mmu.page_fault(vcpu, cr2, error_code, false);
|
2007-10-29 00:48:59 +08:00
|
|
|
if (r < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (!r) {
|
|
|
|
r = 1;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2011-09-22 17:02:48 +08:00
|
|
|
if (is_mmio_page_fault(vcpu, cr2))
|
|
|
|
emulation_type = 0;
|
|
|
|
|
|
|
|
er = x86_emulate_instruction(vcpu, cr2, emulation_type, insn, insn_len);
|
2007-10-29 00:48:59 +08:00
|
|
|
|
|
|
|
switch (er) {
|
|
|
|
case EMULATE_DONE:
|
|
|
|
return 1;
|
|
|
|
case EMULATE_DO_MMIO:
|
|
|
|
++vcpu->stat.mmio_exits;
|
2010-05-10 16:16:56 +08:00
|
|
|
/* fall through */
|
2007-10-29 00:48:59 +08:00
|
|
|
case EMULATE_FAIL:
|
2009-06-11 20:43:28 +08:00
|
|
|
return 0;
|
2007-10-29 00:48:59 +08:00
|
|
|
default:
|
|
|
|
BUG();
|
|
|
|
}
|
|
|
|
out:
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_page_fault);
|
|
|
|
|
2008-09-24 00:18:35 +08:00
|
|
|
void kvm_mmu_invlpg(struct kvm_vcpu *vcpu, gva_t gva)
|
|
|
|
{
|
|
|
|
vcpu->arch.mmu.invlpg(vcpu, gva);
|
|
|
|
kvm_mmu_flush_tlb(vcpu);
|
|
|
|
++vcpu->stat.invlpg;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_invlpg);
|
|
|
|
|
2008-02-07 20:47:41 +08:00
|
|
|
void kvm_enable_tdp(void)
|
|
|
|
{
|
|
|
|
tdp_enabled = true;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_enable_tdp);
|
|
|
|
|
2008-07-15 02:36:36 +08:00
|
|
|
void kvm_disable_tdp(void)
|
|
|
|
{
|
|
|
|
tdp_enabled = false;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_disable_tdp);
|
|
|
|
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
static void free_mmu_pages(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2007-12-13 23:50:52 +08:00
|
|
|
free_page((unsigned long)vcpu->arch.mmu.pae_root);
|
2010-09-10 23:31:00 +08:00
|
|
|
if (vcpu->arch.mmu.lm_root != NULL)
|
|
|
|
free_page((unsigned long)vcpu->arch.mmu.lm_root);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int alloc_mmu_pages(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
2007-01-06 08:36:40 +08:00
|
|
|
struct page *page;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
int i;
|
|
|
|
|
|
|
|
ASSERT(vcpu);
|
|
|
|
|
2007-01-06 08:36:40 +08:00
|
|
|
/*
|
|
|
|
* When emulating 32-bit mode, cr3 is only 32 bits even on x86_64.
|
|
|
|
* Therefore we need to allocate shadow page tables in the first
|
|
|
|
* 4GB of memory, which happens to fit the DMA32 zone.
|
|
|
|
*/
|
|
|
|
page = alloc_page(GFP_KERNEL | __GFP_DMA32);
|
|
|
|
if (!page)
|
2010-01-22 16:55:05 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
|
2007-12-13 23:50:52 +08:00
|
|
|
vcpu->arch.mmu.pae_root = page_address(page);
|
2007-01-06 08:36:40 +08:00
|
|
|
for (i = 0; i < 4; ++i)
|
2007-12-13 23:50:52 +08:00
|
|
|
vcpu->arch.mmu.pae_root[i] = INVALID_PAGE;
|
2007-01-06 08:36:40 +08:00
|
|
|
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-12-30 08:50:01 +08:00
|
|
|
int kvm_mmu_create(struct kvm_vcpu *vcpu)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
|
|
|
ASSERT(vcpu);
|
2011-11-28 20:42:16 +08:00
|
|
|
|
|
|
|
vcpu->arch.walk_mmu = &vcpu->arch.mmu;
|
|
|
|
vcpu->arch.mmu.root_hpa = INVALID_PAGE;
|
|
|
|
vcpu->arch.mmu.translate_gpa = translate_gpa;
|
|
|
|
vcpu->arch.nested_mmu.translate_gpa = translate_nested_gpa;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2006-12-30 08:50:01 +08:00
|
|
|
return alloc_mmu_pages(vcpu);
|
|
|
|
}
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2006-12-30 08:50:01 +08:00
|
|
|
int kvm_mmu_setup(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
ASSERT(vcpu);
|
2007-12-13 23:50:52 +08:00
|
|
|
ASSERT(!VALID_PAGE(vcpu->arch.mmu.root_hpa));
|
2006-12-22 17:05:28 +08:00
|
|
|
|
2006-12-30 08:50:01 +08:00
|
|
|
return init_kvm_mmu(vcpu);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
|
|
|
|
2007-07-17 18:04:56 +08:00
|
|
|
void kvm_mmu_slot_remove_write_access(struct kvm *kvm, int slot)
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
{
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page *sp;
|
2012-06-20 15:57:15 +08:00
|
|
|
bool flush = false;
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
|
2007-12-14 10:01:48 +08:00
|
|
|
list_for_each_entry(sp, &kvm->arch.active_mmu_pages, link) {
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
int i;
|
|
|
|
u64 *pt;
|
|
|
|
|
2008-10-16 17:30:57 +08:00
|
|
|
if (!test_bit(slot, sp->slot_bitmap))
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
continue;
|
|
|
|
|
2007-11-21 21:28:32 +08:00
|
|
|
pt = sp->spt;
|
2010-12-27 18:08:45 +08:00
|
|
|
for (i = 0; i < PT64_ENT_PER_PAGE; ++i) {
|
2011-03-04 18:56:41 +08:00
|
|
|
if (!is_shadow_present_pte(pt[i]) ||
|
|
|
|
!is_last_spte(pt[i], sp->role.level))
|
|
|
|
continue;
|
|
|
|
|
2012-06-20 15:58:58 +08:00
|
|
|
spte_write_protect(kvm, &pt[i], &flush, false);
|
2010-12-27 18:08:45 +08:00
|
|
|
}
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
2008-08-27 21:40:51 +08:00
|
|
|
kvm_flush_remote_tlbs(kvm);
|
[PATCH] kvm: userspace interface
web site: http://kvm.sourceforge.net
mailing list: kvm-devel@lists.sourceforge.net
(http://lists.sourceforge.net/lists/listinfo/kvm-devel)
The following patchset adds a driver for Intel's hardware virtualization
extensions to the x86 architecture. The driver adds a character device
(/dev/kvm) that exposes the virtualization capabilities to userspace. Using
this driver, a process can run a virtual machine (a "guest") in a fully
virtualized PC containing its own virtual hard disks, network adapters, and
display.
Using this driver, one can start multiple virtual machines on a host.
Each virtual machine is a process on the host; a virtual cpu is a thread in
that process. kill(1), nice(1), top(1) work as expected. In effect, the
driver adds a third execution mode to the existing two: we now have kernel
mode, user mode, and guest mode. Guest mode has its own address space mapping
guest physical memory (which is accessible to user mode by mmap()ing
/dev/kvm). Guest mode has no access to any I/O devices; any such access is
intercepted and directed to user mode for emulation.
The driver supports i386 and x86_64 hosts and guests. All combinations are
allowed except x86_64 guest on i386 host. For i386 guests and hosts, both pae
and non-pae paging modes are supported.
SMP hosts and UP guests are supported. At the moment only Intel
hardware is supported, but AMD virtualization support is being worked on.
Performance currently is non-stellar due to the naive implementation of the
mmu virtualization, which throws away most of the shadow page table entries
every context switch. We plan to address this in two ways:
- cache shadow page tables across tlb flushes
- wait until AMD and Intel release processors with nested page tables
Currently a virtual desktop is responsive but consumes a lot of CPU. Under
Windows I tried playing pinball and watching a few flash movies; with a recent
CPU one can hardly feel the virtualization. Linux/X is slower, probably due
to X being in a separate process.
In addition to the driver, you need a slightly modified qemu to provide I/O
device emulation and the BIOS.
Caveats (akpm: might no longer be true):
- The Windows install currently bluescreens due to a problem with the
virtual APIC. We are working on a fix. A temporary workaround is to
use an existing image or install through qemu
- Windows 64-bit does not work. That's also true for qemu, so it's
probably a problem with the device model.
[bero@arklinux.org: build fix]
[simon.kagstrom@bth.se: build fix, other fixes]
[uril@qumranet.com: KVM: Expose interrupt bitmap]
[akpm@osdl.org: i386 build fix]
[mingo@elte.hu: i386 fixes]
[rdreier@cisco.com: add log levels to all printks]
[randy.dunlap@oracle.com: Fix sparse NULL and C99 struct init warnings]
[anthony@codemonkey.ws: KVM: AMD SVM: 32-bit host support]
Signed-off-by: Yaniv Kamay <yaniv@qumranet.com>
Signed-off-by: Avi Kivity <avi@qumranet.com>
Cc: Simon Kagstrom <simon.kagstrom@bth.se>
Cc: Bernhard Rosenkraenzer <bero@arklinux.org>
Signed-off-by: Uri Lublin <uril@qumranet.com>
Cc: Ingo Molnar <mingo@elte.hu>
Cc: Roland Dreier <rolandd@cisco.com>
Signed-off-by: Randy Dunlap <randy.dunlap@oracle.com>
Signed-off-by: Anthony Liguori <anthony@codemonkey.ws>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2006-12-10 18:21:36 +08:00
|
|
|
}
|
2007-01-06 08:36:56 +08:00
|
|
|
|
2007-07-17 18:04:56 +08:00
|
|
|
void kvm_mmu_zap_all(struct kvm *kvm)
|
2007-03-30 18:06:33 +08:00
|
|
|
{
|
2007-11-21 21:28:32 +08:00
|
|
|
struct kvm_mmu_page *sp, *node;
|
2010-06-04 21:55:29 +08:00
|
|
|
LIST_HEAD(invalid_list);
|
2007-03-30 18:06:33 +08:00
|
|
|
|
2007-12-21 08:18:26 +08:00
|
|
|
spin_lock(&kvm->mmu_lock);
|
2010-04-16 16:35:54 +08:00
|
|
|
restart:
|
2007-12-14 10:01:48 +08:00
|
|
|
list_for_each_entry_safe(sp, node, &kvm->arch.active_mmu_pages, link)
|
2010-06-04 21:55:29 +08:00
|
|
|
if (kvm_mmu_prepare_zap_page(kvm, sp, &invalid_list))
|
2010-04-16 16:35:54 +08:00
|
|
|
goto restart;
|
|
|
|
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_commit_zap_page(kvm, &invalid_list);
|
2007-12-21 08:18:26 +08:00
|
|
|
spin_unlock(&kvm->mmu_lock);
|
2007-03-30 18:06:33 +08:00
|
|
|
}
|
|
|
|
|
2011-12-03 01:35:24 +08:00
|
|
|
static void kvm_mmu_remove_some_alloc_mmu_pages(struct kvm *kvm,
|
|
|
|
struct list_head *invalid_list)
|
2008-03-30 20:17:21 +08:00
|
|
|
{
|
|
|
|
struct kvm_mmu_page *page;
|
|
|
|
|
2012-07-03 14:31:43 +08:00
|
|
|
if (list_empty(&kvm->arch.active_mmu_pages))
|
|
|
|
return;
|
|
|
|
|
2008-03-30 20:17:21 +08:00
|
|
|
page = container_of(kvm->arch.active_mmu_pages.prev,
|
|
|
|
struct kvm_mmu_page, link);
|
2011-12-03 01:35:24 +08:00
|
|
|
kvm_mmu_prepare_zap_page(kvm, page, invalid_list);
|
2008-03-30 20:17:21 +08:00
|
|
|
}
|
|
|
|
|
2011-05-25 08:12:27 +08:00
|
|
|
static int mmu_shrink(struct shrinker *shrink, struct shrink_control *sc)
|
2008-03-30 20:17:21 +08:00
|
|
|
{
|
|
|
|
struct kvm *kvm;
|
2011-05-25 08:12:27 +08:00
|
|
|
int nr_to_scan = sc->nr_to_scan;
|
KVM: create aggregate kvm_total_used_mmu_pages value
Of slab shrinkers, the VM code says:
* Note that 'shrink' will be passed nr_to_scan == 0 when the VM is
* querying the cache size, so a fastpath for that case is appropriate.
and it *means* it. Look at how it calls the shrinkers:
nr_before = (*shrinker->shrink)(0, gfp_mask);
shrink_ret = (*shrinker->shrink)(this_scan, gfp_mask);
So, if you do anything stupid in your shrinker, the VM will doubly
punish you.
The mmu_shrink() function takes the global kvm_lock, then acquires
every VM's kvm->mmu_lock in sequence. If we have 100 VMs, then
we're going to take 101 locks. We do it twice, so each call takes
202 locks. If we're under memory pressure, we can have each cpu
trying to do this. It can get really hairy, and we've seen lock
spinning in mmu_shrink() be the dominant entry in profiles.
This is guaranteed to optimize at least half of those lock
aquisitions away. It removes the need to take any of the locks
when simply trying to count objects.
A 'percpu_counter' can be a large object, but we only have one
of these for the entire system. There are not any better
alternatives at the moment, especially ones that handle CPU
hotplug.
Signed-off-by: Dave Hansen <dave@linux.vnet.ibm.com>
Signed-off-by: Tim Pepper <lnxninja@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2010-08-20 09:11:37 +08:00
|
|
|
|
|
|
|
if (nr_to_scan == 0)
|
|
|
|
goto out;
|
2008-03-30 20:17:21 +08:00
|
|
|
|
2011-02-08 19:55:33 +08:00
|
|
|
raw_spin_lock(&kvm_lock);
|
2008-03-30 20:17:21 +08:00
|
|
|
|
|
|
|
list_for_each_entry(kvm, &vm_list, vm_list) {
|
2011-12-03 01:35:24 +08:00
|
|
|
int idx;
|
2010-06-04 21:55:29 +08:00
|
|
|
LIST_HEAD(invalid_list);
|
2008-03-30 20:17:21 +08:00
|
|
|
|
2012-08-20 17:35:39 +08:00
|
|
|
/*
|
|
|
|
* Never scan more than sc->nr_to_scan VM instances.
|
|
|
|
* Will not hit this condition practically since we do not try
|
|
|
|
* to shrink more than one VM and it is very unlikely to see
|
|
|
|
* !n_used_mmu_pages so many times.
|
|
|
|
*/
|
|
|
|
if (!nr_to_scan--)
|
|
|
|
break;
|
2012-06-04 19:53:23 +08:00
|
|
|
/*
|
|
|
|
* n_used_mmu_pages is accessed without holding kvm->mmu_lock
|
|
|
|
* here. We may skip a VM instance errorneosly, but we do not
|
|
|
|
* want to shrink a VM that only started to populate its MMU
|
|
|
|
* anyway.
|
|
|
|
*/
|
2012-08-20 17:35:39 +08:00
|
|
|
if (!kvm->arch.n_used_mmu_pages)
|
2012-06-04 19:53:23 +08:00
|
|
|
continue;
|
|
|
|
|
2009-12-24 00:35:25 +08:00
|
|
|
idx = srcu_read_lock(&kvm->srcu);
|
2008-03-30 20:17:21 +08:00
|
|
|
spin_lock(&kvm->mmu_lock);
|
|
|
|
|
2012-06-04 19:53:23 +08:00
|
|
|
kvm_mmu_remove_some_alloc_mmu_pages(kvm, &invalid_list);
|
2010-06-04 21:55:29 +08:00
|
|
|
kvm_mmu_commit_zap_page(kvm, &invalid_list);
|
2012-06-04 19:53:23 +08:00
|
|
|
|
2008-03-30 20:17:21 +08:00
|
|
|
spin_unlock(&kvm->mmu_lock);
|
2009-12-24 00:35:25 +08:00
|
|
|
srcu_read_unlock(&kvm->srcu, idx);
|
2012-06-04 19:53:23 +08:00
|
|
|
|
|
|
|
list_move_tail(&kvm->vm_list, &vm_list);
|
|
|
|
break;
|
2008-03-30 20:17:21 +08:00
|
|
|
}
|
|
|
|
|
2011-02-08 19:55:33 +08:00
|
|
|
raw_spin_unlock(&kvm_lock);
|
2008-03-30 20:17:21 +08:00
|
|
|
|
KVM: create aggregate kvm_total_used_mmu_pages value
Of slab shrinkers, the VM code says:
* Note that 'shrink' will be passed nr_to_scan == 0 when the VM is
* querying the cache size, so a fastpath for that case is appropriate.
and it *means* it. Look at how it calls the shrinkers:
nr_before = (*shrinker->shrink)(0, gfp_mask);
shrink_ret = (*shrinker->shrink)(this_scan, gfp_mask);
So, if you do anything stupid in your shrinker, the VM will doubly
punish you.
The mmu_shrink() function takes the global kvm_lock, then acquires
every VM's kvm->mmu_lock in sequence. If we have 100 VMs, then
we're going to take 101 locks. We do it twice, so each call takes
202 locks. If we're under memory pressure, we can have each cpu
trying to do this. It can get really hairy, and we've seen lock
spinning in mmu_shrink() be the dominant entry in profiles.
This is guaranteed to optimize at least half of those lock
aquisitions away. It removes the need to take any of the locks
when simply trying to count objects.
A 'percpu_counter' can be a large object, but we only have one
of these for the entire system. There are not any better
alternatives at the moment, especially ones that handle CPU
hotplug.
Signed-off-by: Dave Hansen <dave@linux.vnet.ibm.com>
Signed-off-by: Tim Pepper <lnxninja@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
2010-08-20 09:11:37 +08:00
|
|
|
out:
|
|
|
|
return percpu_counter_read_positive(&kvm_total_used_mmu_pages);
|
2008-03-30 20:17:21 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct shrinker mmu_shrinker = {
|
|
|
|
.shrink = mmu_shrink,
|
|
|
|
.seeks = DEFAULT_SEEKS * 10,
|
|
|
|
};
|
|
|
|
|
2008-05-22 16:37:48 +08:00
|
|
|
static void mmu_destroy_caches(void)
|
2007-04-15 21:31:09 +08:00
|
|
|
{
|
2011-05-15 23:26:20 +08:00
|
|
|
if (pte_list_desc_cache)
|
|
|
|
kmem_cache_destroy(pte_list_desc_cache);
|
2007-05-30 17:34:53 +08:00
|
|
|
if (mmu_page_header_cache)
|
|
|
|
kmem_cache_destroy(mmu_page_header_cache);
|
2007-04-15 21:31:09 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int kvm_mmu_module_init(void)
|
|
|
|
{
|
2011-05-15 23:26:20 +08:00
|
|
|
pte_list_desc_cache = kmem_cache_create("pte_list_desc",
|
|
|
|
sizeof(struct pte_list_desc),
|
2007-07-20 09:11:58 +08:00
|
|
|
0, 0, NULL);
|
2011-05-15 23:26:20 +08:00
|
|
|
if (!pte_list_desc_cache)
|
2007-04-15 21:31:09 +08:00
|
|
|
goto nomem;
|
|
|
|
|
2007-05-30 17:34:53 +08:00
|
|
|
mmu_page_header_cache = kmem_cache_create("kvm_mmu_page_header",
|
|
|
|
sizeof(struct kvm_mmu_page),
|
2007-07-20 09:11:58 +08:00
|
|
|
0, 0, NULL);
|
2007-05-30 17:34:53 +08:00
|
|
|
if (!mmu_page_header_cache)
|
|
|
|
goto nomem;
|
|
|
|
|
2010-08-23 16:13:15 +08:00
|
|
|
if (percpu_counter_init(&kvm_total_used_mmu_pages, 0))
|
|
|
|
goto nomem;
|
|
|
|
|
2008-03-30 20:17:21 +08:00
|
|
|
register_shrinker(&mmu_shrinker);
|
|
|
|
|
2007-04-15 21:31:09 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
nomem:
|
2008-03-30 20:17:21 +08:00
|
|
|
mmu_destroy_caches();
|
2007-04-15 21:31:09 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2007-11-20 13:11:38 +08:00
|
|
|
/*
|
|
|
|
* Caculate mmu pages needed for kvm.
|
|
|
|
*/
|
|
|
|
unsigned int kvm_mmu_calculate_mmu_pages(struct kvm *kvm)
|
|
|
|
{
|
|
|
|
unsigned int nr_mmu_pages;
|
|
|
|
unsigned int nr_pages = 0;
|
2009-12-24 00:35:21 +08:00
|
|
|
struct kvm_memslots *slots;
|
2011-11-24 17:39:18 +08:00
|
|
|
struct kvm_memory_slot *memslot;
|
2007-11-20 13:11:38 +08:00
|
|
|
|
2010-04-19 17:41:23 +08:00
|
|
|
slots = kvm_memslots(kvm);
|
|
|
|
|
2011-11-24 17:39:18 +08:00
|
|
|
kvm_for_each_memslot(memslot, slots)
|
|
|
|
nr_pages += memslot->npages;
|
2007-11-20 13:11:38 +08:00
|
|
|
|
|
|
|
nr_mmu_pages = nr_pages * KVM_PERMILLE_MMU_PAGES / 1000;
|
|
|
|
nr_mmu_pages = max(nr_mmu_pages,
|
|
|
|
(unsigned int) KVM_MIN_ALLOC_MMU_PAGES);
|
|
|
|
|
|
|
|
return nr_mmu_pages;
|
|
|
|
}
|
|
|
|
|
2009-06-11 23:07:42 +08:00
|
|
|
int kvm_mmu_get_spte_hierarchy(struct kvm_vcpu *vcpu, u64 addr, u64 sptes[4])
|
|
|
|
{
|
|
|
|
struct kvm_shadow_walk_iterator iterator;
|
2011-07-12 03:32:13 +08:00
|
|
|
u64 spte;
|
2009-06-11 23:07:42 +08:00
|
|
|
int nr_sptes = 0;
|
|
|
|
|
2011-07-12 03:32:13 +08:00
|
|
|
walk_shadow_page_lockless_begin(vcpu);
|
|
|
|
for_each_shadow_entry_lockless(vcpu, addr, iterator, spte) {
|
|
|
|
sptes[iterator.level-1] = spte;
|
2009-06-11 23:07:42 +08:00
|
|
|
nr_sptes++;
|
2011-07-12 03:32:13 +08:00
|
|
|
if (!is_shadow_present_pte(spte))
|
2009-06-11 23:07:42 +08:00
|
|
|
break;
|
|
|
|
}
|
2011-07-12 03:32:13 +08:00
|
|
|
walk_shadow_page_lockless_end(vcpu);
|
2009-06-11 23:07:42 +08:00
|
|
|
|
|
|
|
return nr_sptes;
|
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(kvm_mmu_get_spte_hierarchy);
|
|
|
|
|
2010-09-27 18:07:07 +08:00
|
|
|
void kvm_mmu_destroy(struct kvm_vcpu *vcpu)
|
|
|
|
{
|
|
|
|
ASSERT(vcpu);
|
|
|
|
|
|
|
|
destroy_kvm_mmu(vcpu);
|
|
|
|
free_mmu_pages(vcpu);
|
|
|
|
mmu_free_memory_caches(vcpu);
|
2010-12-23 16:08:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void kvm_mmu_module_exit(void)
|
|
|
|
{
|
|
|
|
mmu_destroy_caches();
|
|
|
|
percpu_counter_destroy(&kvm_total_used_mmu_pages);
|
|
|
|
unregister_shrinker(&mmu_shrinker);
|
2010-09-27 18:07:07 +08:00
|
|
|
mmu_audit_disable();
|
|
|
|
}
|