Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp368160pxa; Fri, 31 Jul 2020 14:25:56 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy8CU+w41CtsYBsC3bZUtW1nEqaxQ3scIAGWcSLxPmM/W3VvD9EN3zoIH1srIT5YXDZS2P2 X-Received: by 2002:a05:6402:74a:: with SMTP id p10mr5804781edy.348.1596230756433; Fri, 31 Jul 2020 14:25:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596230756; cv=none; d=google.com; s=arc-20160816; b=J442pgFZNxyFozwRlG02AykuLs6xADdULpGGsfkN8+53buVzSNwZkWNPA7HfwyQBvv W0WnCssrDyjottzNaH/Sq8fMmRvcqmv70oMo8txQyalaQDZtuYI2kfKuB1UBxOhNgceJ yLMxTOp2Mg5kGk64bH5G1KqVx2cju+pcFTePVPAN7UAhQNHvfH6zlDl4jsEBWCwNXDMm N2loJyDRfCGO7VML/2Oihd/VUKlZGXoctyLFf+9LaTURaeSQ9addjboQk95ecyUCMiST nEPUclkvazXtpbOsDFK8HGOnX9cb76g22achVcPnlYnYvsj8LpGs/AHvGejTkVWqIhTv AVMA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=M2HIGlgzc1SaYvDQ1hRIrte4zUNjp3K8bSAfYqz8yQo=; b=WWUKfMjzzGN5nH4EZBFQVkPVJxmZOrFgD8D9gLrvI08zX32iKoeiLFw2SaVqXrqtdi f8zcGY7abTGscmslbPVnkIKVOdUQYMpbQHg8Zwc5ONWM/0MyQVeW6YLYDfOh9s37F+sW lbSM/CsJQCg2cbn4YVYZNxiQ2Fq8OkcAiXlfAZf7SviIH3+OMdumz/fz88spy0j5Y8rk 5o/nOSmrllOXo7G+fVkKz/pL+GYaFDREjpfu31PK2LkHugbhMyUuqGewfoFeRuw9fnjG CB+8I8suUVR7ue4HhdWkV8qslm9vzT2eTVgfVZquLYSQU6ap0e+3wT/n9+0TbdtuW72x iMtQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u17si6077885edy.254.2020.07.31.14.25.33; Fri, 31 Jul 2020 14:25:56 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728678AbgGaVX1 (ORCPT + 99 others); Fri, 31 Jul 2020 17:23:27 -0400 Received: from mga14.intel.com ([192.55.52.115]:50224 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728163AbgGaVX1 (ORCPT ); Fri, 31 Jul 2020 17:23:27 -0400 IronPort-SDR: HijNdAYRtKmE9g3tcHzpEd+Rjq9M0BkBonaN4mVbjeCGUmjmX8APcbxKDtoxXg9nAiOI4uwndI s/umPP1CZZug== X-IronPort-AV: E=McAfee;i="6000,8403,9699"; a="151075127" X-IronPort-AV: E=Sophos;i="5.75,419,1589266800"; d="scan'208";a="151075127" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 Jul 2020 14:23:26 -0700 IronPort-SDR: oTBERTbqHkpkNNTA9L4r9QbNT7cLdo4vviEhrdixBuUuB1suq+jhUh48eJQdDkxK/zcCQOuEC1 JgHtVsq6+8cQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,419,1589266800"; d="scan'208";a="331191296" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.160]) by orsmga007.jf.intel.com with ESMTP; 31 Jul 2020 14:23:26 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, eric van tassell , Tom Lendacky Subject: [RFC PATCH 1/8] KVM: x86/mmu: Return old SPTE from mmu_spte_clear_track_bits() Date: Fri, 31 Jul 2020 14:23:16 -0700 Message-Id: <20200731212323.21746-2-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200731212323.21746-1-sean.j.christopherson@intel.com> References: <20200731212323.21746-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Return the old SPTE when clearing a SPTE and push the "old SPTE present" check to the caller. Tracking pinned SPTEs will use the old SPTE in rmap_remove() to determine whether or not the SPTE is pinned. Signed-off-by: Sean Christopherson --- arch/x86/kvm/mmu/mmu.c | 12 +++++++----- 1 file changed, 7 insertions(+), 5 deletions(-) diff --git a/arch/x86/kvm/mmu/mmu.c b/arch/x86/kvm/mmu/mmu.c index 289dddff2615f..d737042fea55e 100644 --- a/arch/x86/kvm/mmu/mmu.c +++ b/arch/x86/kvm/mmu/mmu.c @@ -930,9 +930,9 @@ static bool mmu_spte_update(u64 *sptep, u64 new_spte) * Rules for using mmu_spte_clear_track_bits: * It sets the sptep from present to nonpresent, and track the * state bits, it is used to clear the last level sptep. - * Returns non-zero if the PTE was previously valid. + * Returns the old PTE. */ -static int mmu_spte_clear_track_bits(u64 *sptep) +static u64 mmu_spte_clear_track_bits(u64 *sptep) { kvm_pfn_t pfn; u64 old_spte = *sptep; @@ -943,7 +943,7 @@ static int mmu_spte_clear_track_bits(u64 *sptep) old_spte = __update_clear_spte_slow(sptep, 0ull); if (!is_shadow_present_pte(old_spte)) - return 0; + return old_spte; pfn = spte_to_pfn(old_spte); @@ -960,7 +960,7 @@ static int mmu_spte_clear_track_bits(u64 *sptep) if (is_dirty_spte(old_spte)) kvm_set_pfn_dirty(pfn); - return 1; + return old_spte; } /* @@ -1484,7 +1484,9 @@ static u64 *rmap_get_next(struct rmap_iterator *iter) static void drop_spte(struct kvm *kvm, u64 *sptep) { - if (mmu_spte_clear_track_bits(sptep)) + u64 old_spte = mmu_spte_clear_track_bits(sptep); + + if (is_shadow_present_pte(old_spte)) rmap_remove(kvm, sptep); } -- 2.28.0