• Sean Christopherson's avatar
    KVM: x86/mmu: Use MMU role to check for matching guest page sizes · 00a66978
    Sean Christopherson authored
    Originally, __kvm_sync_page used to check the cr4_pae bit in the role
    to avoid zapping 4-byte kvm_mmu_pages when guest page size are 8-byte
    or the other way round.  However, in commit 47c42e6b ("KVM: x86: fix
    handling of role.cr4_pae and rename it to 'gpte_size'", 2019-03-28) it
    was observed that this did not work for nested EPT, where the page table
    size would be 8 bytes even if CR4.PAE=0.  (Note that the check still
    has to be done for nested *NPT*, so it is not possible to use tdp_enabled
    or similar).
    
    Therefore, a hack was introduced to identify nested EPT shadow pages
    and unconditionally call __kvm_sync_page() on them.  However, it is
    possible to do without the hack to identify nested EPT shadow pages:
    if EPT is active, there will be no shadow pages in non-EPT format,
    and all of them will have gpte_is_8_bytes set to true; we can just
    check the MMU role directly, and the test will always be true.
    
    Even for non-EPT shadow MMUs, this test should really always be true
    now that __kvm_sync_page() is called if and only if the role is an
    exact match (kvm_mmu_get_page()) or is part of the current MMU context
    (kvm_mmu_sync_roots()).  A future commit will convert the likely-pointless
    check into a meaningful WARN to enforce that the mmu_roles of the current
    context and the shadow page are compatible.
    
    Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
    Signed-off-by: default avatarSean Christopherson <seanjc@google.com>
    Message-Id: <20210622175739.3610207-11-seanjc@google.com>
    Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
    00a66978
mmu.c 162 KB