[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20220311070346.45023-1-jiangshanlai@gmail.com>
Date: Fri, 11 Mar 2022 15:03:40 +0800
From: Lai Jiangshan <jiangshanlai@...il.com>
To: linux-kernel@...r.kernel.org, kvm@...r.kernel.org,
Paolo Bonzini <pbonzini@...hat.com>,
Sean Christopherson <seanjc@...gle.com>
Cc: Lai Jiangshan <jiangshan.ljs@...group.com>
Subject: [PATCH V2 0/5] KVM: X86: permission_fault() for SMAP
From: Lai Jiangshan <jiangshan.ljs@...group.com>
Some change in permission_fault() for SMAP. It also reduces
calls two callbacks to get CPL and RFLAGS in come cases, but it
has not any measurable performance change in tests (kernel build
in guest).
Changed from 1:
gross implicit access into @access as Sean suggested.
Use my official email address (Ant Group). The work is backed
by my company and I was incorrectly misunderstood that
XXX@...ux.alibaba.com is the only portal for opensource work
in the corporate group.
[V1]: https://lore.kernel.org/kvm/20211207095039.53166-1-jiangshanlai@gmail.com/
Lai Jiangshan (6):
KVM: X86: Change the type of access u32 to u64
KVM: X86: Fix comments in update_permission_bitmask
KVM: X86: Rename variable smap to not_smap in permission_fault()
KVM: X86: Handle implicit supervisor access with SMAP
KVM: X86: Only get rflags when needed in permission_fault()
KVM: X86: Propagate the nested page fault info to the guest
arch/x86/include/asm/kvm_host.h | 6 +++-
arch/x86/kvm/kvm_emulate.h | 3 +-
arch/x86/kvm/mmu.h | 54 ++++++++++++++++++++++-----------
arch/x86/kvm/mmu/mmu.c | 10 +++---
arch/x86/kvm/mmu/paging_tmpl.h | 16 ++++++----
arch/x86/kvm/svm/nested.c | 10 ++----
arch/x86/kvm/vmx/nested.c | 11 +++++++
arch/x86/kvm/x86.c | 32 ++++++++++---------
8 files changed, 89 insertions(+), 53 deletions(-)
--
2.19.1.6.gb485710b
Powered by blists - more mailing lists