Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754523Ab0F2IvO (ORCPT ); Tue, 29 Jun 2010 04:51:14 -0400 Received: from mx1.redhat.com ([209.132.183.28]:61172 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1754240Ab0F2IvM (ORCPT ); Tue, 29 Jun 2010 04:51:12 -0400 Message-ID: <4C29B3FD.8040802@redhat.com> Date: Tue, 29 Jun 2010 11:51:09 +0300 From: Avi Kivity User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.1.9) Gecko/20100430 Fedora/3.0.4-3.fc13 Thunderbird/3.0.4 MIME-Version: 1.0 To: Xiao Guangrong CC: Marcelo Tosatti , LKML , KVM list Subject: Re: [PATCH v2 3/10] KVM: MMU: fix direct sp's access corruptted References: <4C2498EC.2010006@cn.fujitsu.com> <4C249BAD.6000609@cn.fujitsu.com> <4C287081.40300@redhat.com> <4C287332.5080803@cn.fujitsu.com> <4C2883D3.2050606@redhat.com> <4C2949A5.1070303@cn.fujitsu.com> <4C299B7E.5020303@redhat.com> <4C29A30A.8020107@redhat.com> <4C29A49C.8040804@cn.fujitsu.com> In-Reply-To: <4C29A49C.8040804@cn.fujitsu.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1354 Lines: 29 On 06/29/2010 10:45 AM, Xiao Guangrong wrote: > >> - there was once talk that instead of folding pt_access and pte_access >> together into the leaf sp->role.access, each sp level would have its own >> access permissions. In this case we don't even have to get a new direct >> sp, only change the PT_DIRECTORY_LEVEL spte to add write permissions >> (all direct sp's would be writeable and permissions would be controlled >> at their parent_pte level). Of course that's a much bigger change than >> this bug fix. >> >> > Yeah, i have considered this way, but it will change the shadow page's mapping > way: it control the access at the upper level, but in the current code, we allow > the upper level have the ALL_ACCESS and control the access right at the last level. > It will break many things, such as write-protected... > spte's access bits have dual purpose, both to map guest protection and for host protection (like for shadowed pages, or ksm pages). So the last level sptes still need to consider host write protection. -- error compiling committee.c: too many arguments to function -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/