Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754137Ab0F2HtU (ORCPT ); Tue, 29 Jun 2010 03:49:20 -0400 Received: from cn.fujitsu.com ([222.73.24.84]:55817 "EHLO song.cn.fujitsu.com" rhost-flags-OK-FAIL-OK-OK) by vger.kernel.org with ESMTP id S1753388Ab0F2HtT (ORCPT ); Tue, 29 Jun 2010 03:49:19 -0400 Message-ID: <4C29A49C.8040804@cn.fujitsu.com> Date: Tue, 29 Jun 2010 15:45:32 +0800 From: Xiao Guangrong User-Agent: Thunderbird 2.0.0.24 (Windows/20100228) MIME-Version: 1.0 To: Avi Kivity CC: Marcelo Tosatti , LKML , KVM list Subject: Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted References: <4C2498EC.2010006@cn.fujitsu.com> <4C249BAD.6000609@cn.fujitsu.com> <4C287081.40300@redhat.com> <4C287332.5080803@cn.fujitsu.com> <4C2883D3.2050606@redhat.com> <4C2949A5.1070303@cn.fujitsu.com> <4C299B7E.5020303@redhat.com> <4C29A30A.8020107@redhat.com> In-Reply-To: <4C29A30A.8020107@redhat.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1298 Lines: 30 Avi Kivity wrote: > > Note: > > - modifying walk_addr() to call kvm_mmu_pte_write() is probably not so > bad. It's rare that a large pte walk sets the dirty bit, and it's > probably rare to share those large ptes. Still, I think the fetch() > change is better since it's more local. > > - there was once talk that instead of folding pt_access and pte_access > together into the leaf sp->role.access, each sp level would have its own > access permissions. In this case we don't even have to get a new direct > sp, only change the PT_DIRECTORY_LEVEL spte to add write permissions > (all direct sp's would be writeable and permissions would be controlled > at their parent_pte level). Of course that's a much bigger change than > this bug fix. > Yeah, i have considered this way, but it will change the shadow page's mapping way: it control the access at the upper level, but in the current code, we allow the upper level have the ALL_ACCESS and control the access right at the last level. It will break many things, such as write-protected... -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/