On 2014-07-14 16:58, Gleb Natapov wrote:
>>>> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
>>>> index ffbe557..7080eda 100644
>>>> --- a/arch/x86/kvm/x86.c
>>>> +++ b/arch/x86/kvm/x86.c
>>>> @@ -5929,6 +5929,18 @@ static void vcpu_scan_ioapic(struct kvm_vcpu *vcpu)
>>>>    kvm_apic_update_tmr(vcpu, tmr);
>>>>  }
>>>>
>>>> +static void vcpu_reload_apic_access_page(struct kvm_vcpu *vcpu)
>>>> +{
>>>> +  /*
>>>> +   * When the page is being migrated, GUP will wait till the migrate
>>>> +   * entry is replaced with the new pte entry pointing to the new page.
>>>> +   */
>>>> +  struct page *page = gfn_to_page_no_pin(vcpu->kvm,
>>>> +                                  APIC_DEFAULT_PHYS_BASE>>  PAGE_SHIFT);
>>> If you do not use kvm->arch.apic_access_page to get current address why not 
>>> drop it entirely?
>>>
>>
>> I should also update kvm->arch.apic_access_page here. It is used in other
>> places
>> in kvm, so I don't think we should drop it. Will update the patch.
> What other places? The only other place I see is in nested kvm code and you 
> can call
> gfn_to_page_no_pin() there instead of using kvm->arch.apic_access_page 
> directly. But
> as far as I see nested kvm code cannot handle change of APIC_ACCESS_ADDR phys 
> address.
> If APIC_ACCESS_ADDR changes during nested guest run, non nested vmcs will 
> still have old
> physical address. One way to fix that is to set KVM_REQ_APIC_PAGE_RELOAD 
> during nested exit.

I cannot follow your concerns yet. Specifically, how should
APIC_ACCESS_ADDR (the VMCS field, right?) change while L2 is running? We
currently pin/unpin on L1->L2/L2->L1, respectively. Or what do you mean?

Jan


Attachment: signature.asc
Description: OpenPGP digital signature

Reply via email to