[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALzav=cOnS0k5RRRs4wn4jCwFKNBHuPSj+mJjbp=n-E0uvU=Cg@mail.gmail.com>
Date: Mon, 5 Aug 2024 09:49:51 -0700
From: David Matlack <dmatlack@...gle.com>
To: Sean Christopherson <seanjc@...gle.com>
Cc: Paolo Bonzini <pbonzini@...hat.com>, kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [RFC PATCH 4/9] KVM: x86/mmu: Use Accessed bit even when
_hardware_ A/D bits are disabled
On Thu, Aug 1, 2024 at 11:36 AM Sean Christopherson <seanjc@...gle.com> wrote:
> --- a/arch/x86/kvm/mmu/spte.c
> +++ b/arch/x86/kvm/mmu/spte.c
> @@ -181,7 +181,7 @@ bool make_spte(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp,
>
> spte |= shadow_present_mask;
> if (!prefetch)
> - spte |= spte_shadow_accessed_mask(spte);
> + spte |= shadow_accessed_mask;
>
> /*
> * For simplicity, enforce the NX huge page mitigation even if not
> @@ -258,7 +258,7 @@ bool make_spte(struct kvm_vcpu *vcpu, struct kvm_mmu_page *sp,
> }
>
> if (pte_access & ACC_WRITE_MASK)
> - spte |= spte_shadow_dirty_mask(spte);
> + spte |= shadow_accessed_mask;
spte |= shadow_dirty_mask;
Powered by blists - more mailing lists