2 * Kernel-based Virtual Machine driver for Linux
4 * This module enables machines with Intel VT-x extensions to run virtual
5 * machines without emulation or binary translation.
9 * Copyright (C) 2006 Qumranet, Inc.
12 * Yaniv Kamay <yaniv@qumranet.com>
13 * Avi Kivity <avi@qumranet.com>
15 * This work is licensed under the terms of the GNU GPL, version 2. See
16 * the COPYING file in the top-level directory.
24 #include <linux/types.h>
25 #include <linux/string.h>
27 #include <linux/highmem.h>
28 #include <linux/module.h>
31 #include <asm/cmpxchg.h>
38 static void kvm_mmu_audit(struct kvm_vcpu *vcpu, const char *msg);
40 static void kvm_mmu_audit(struct kvm_vcpu *vcpu, const char *msg) {}
45 #define pgprintk(x...) do { if (dbg) printk(x); } while (0)
46 #define rmap_printk(x...) do { if (dbg) printk(x); } while (0)
50 #define pgprintk(x...) do { } while (0)
51 #define rmap_printk(x...) do { } while (0)
55 #if defined(MMU_DEBUG) || defined(AUDIT)
60 #define ASSERT(x) do { } while (0)
64 printk(KERN_WARNING "assertion failed %s:%d: %s\n", \
65 __FILE__, __LINE__, #x); \
69 #define PT64_PT_BITS 9
70 #define PT64_ENT_PER_PAGE (1 << PT64_PT_BITS)
71 #define PT32_PT_BITS 10
72 #define PT32_ENT_PER_PAGE (1 << PT32_PT_BITS)
74 #define PT_WRITABLE_SHIFT 1
76 #define PT_PRESENT_MASK (1ULL << 0)
77 #define PT_WRITABLE_MASK (1ULL << PT_WRITABLE_SHIFT)
78 #define PT_USER_MASK (1ULL << 2)
79 #define PT_PWT_MASK (1ULL << 3)
80 #define PT_PCD_MASK (1ULL << 4)
81 #define PT_ACCESSED_MASK (1ULL << 5)
82 #define PT_DIRTY_MASK (1ULL << 6)
83 #define PT_PAGE_SIZE_MASK (1ULL << 7)
84 #define PT_PAT_MASK (1ULL << 7)
85 #define PT_GLOBAL_MASK (1ULL << 8)
86 #define PT64_NX_MASK (1ULL << 63)
88 #define PT_PAT_SHIFT 7
89 #define PT_DIR_PAT_SHIFT 12
90 #define PT_DIR_PAT_MASK (1ULL << PT_DIR_PAT_SHIFT)
92 #define PT32_DIR_PSE36_SIZE 4
93 #define PT32_DIR_PSE36_SHIFT 13
94 #define PT32_DIR_PSE36_MASK \
95 (((1ULL << PT32_DIR_PSE36_SIZE) - 1) << PT32_DIR_PSE36_SHIFT)
98 #define PT_FIRST_AVAIL_BITS_SHIFT 9
99 #define PT64_SECOND_AVAIL_BITS_SHIFT 52
101 #define PT_SHADOW_IO_MARK (1ULL << PT_FIRST_AVAIL_BITS_SHIFT)
103 #define VALID_PAGE(x) ((x) != INVALID_PAGE)
105 #define PT64_LEVEL_BITS 9
107 #define PT64_LEVEL_SHIFT(level) \
108 (PAGE_SHIFT + (level - 1) * PT64_LEVEL_BITS)
110 #define PT64_LEVEL_MASK(level) \
111 (((1ULL << PT64_LEVEL_BITS) - 1) << PT64_LEVEL_SHIFT(level))
113 #define PT64_INDEX(address, level)\
114 (((address) >> PT64_LEVEL_SHIFT(level)) & ((1 << PT64_LEVEL_BITS) - 1))
117 #define PT32_LEVEL_BITS 10
119 #define PT32_LEVEL_SHIFT(level) \
120 (PAGE_SHIFT + (level - 1) * PT32_LEVEL_BITS)
122 #define PT32_LEVEL_MASK(level) \
123 (((1ULL << PT32_LEVEL_BITS) - 1) << PT32_LEVEL_SHIFT(level))
125 #define PT32_INDEX(address, level)\
126 (((address) >> PT32_LEVEL_SHIFT(level)) & ((1 << PT32_LEVEL_BITS) - 1))
129 #define PT64_BASE_ADDR_MASK (((1ULL << 52) - 1) & ~(u64)(PAGE_SIZE-1))
130 #define PT64_DIR_BASE_ADDR_MASK \
131 (PT64_BASE_ADDR_MASK & ~((1ULL << (PAGE_SHIFT + PT64_LEVEL_BITS)) - 1))
133 #define PT32_BASE_ADDR_MASK PAGE_MASK
134 #define PT32_DIR_BASE_ADDR_MASK \
135 (PAGE_MASK & ~((1ULL << (PAGE_SHIFT + PT32_LEVEL_BITS)) - 1))
138 #define PFERR_PRESENT_MASK (1U << 0)
139 #define PFERR_WRITE_MASK (1U << 1)
140 #define PFERR_USER_MASK (1U << 2)
141 #define PFERR_FETCH_MASK (1U << 4)
143 #define PT64_ROOT_LEVEL 4
144 #define PT32_ROOT_LEVEL 2
145 #define PT32E_ROOT_LEVEL 3
147 #define PT_DIRECTORY_LEVEL 2
148 #define PT_PAGE_TABLE_LEVEL 1
152 struct kvm_rmap_desc {
153 u64 *shadow_ptes[RMAP_EXT];
154 struct kvm_rmap_desc *more;
157 static struct kmem_cache *pte_chain_cache;
158 static struct kmem_cache *rmap_desc_cache;
159 static struct kmem_cache *mmu_page_header_cache;
161 static u64 __read_mostly shadow_trap_nonpresent_pte;
162 static u64 __read_mostly shadow_notrap_nonpresent_pte;
164 void kvm_mmu_set_nonpresent_ptes(u64 trap_pte, u64 notrap_pte)
166 shadow_trap_nonpresent_pte = trap_pte;
167 shadow_notrap_nonpresent_pte = notrap_pte;
169 EXPORT_SYMBOL_GPL(kvm_mmu_set_nonpresent_ptes);
171 static int is_write_protection(struct kvm_vcpu *vcpu)
173 return vcpu->cr0 & X86_CR0_WP;
176 static int is_cpuid_PSE36(void)
181 static int is_nx(struct kvm_vcpu *vcpu)
183 return vcpu->shadow_efer & EFER_NX;
186 static int is_present_pte(unsigned long pte)
188 return pte & PT_PRESENT_MASK;
191 static int is_shadow_present_pte(u64 pte)
193 pte &= ~PT_SHADOW_IO_MARK;
194 return pte != shadow_trap_nonpresent_pte
195 && pte != shadow_notrap_nonpresent_pte;
198 static int is_writeble_pte(unsigned long pte)
200 return pte & PT_WRITABLE_MASK;
203 static int is_dirty_pte(unsigned long pte)
205 return pte & PT_DIRTY_MASK;
208 static int is_io_pte(unsigned long pte)
210 return pte & PT_SHADOW_IO_MARK;
213 static int is_rmap_pte(u64 pte)
215 return pte != shadow_trap_nonpresent_pte
216 && pte != shadow_notrap_nonpresent_pte;
219 static void set_shadow_pte(u64 *sptep, u64 spte)
222 set_64bit((unsigned long *)sptep, spte);
224 set_64bit((unsigned long long *)sptep, spte);
228 static int mmu_topup_memory_cache(struct kvm_mmu_memory_cache *cache,
229 struct kmem_cache *base_cache, int min)
233 if (cache->nobjs >= min)
235 while (cache->nobjs < ARRAY_SIZE(cache->objects)) {
236 obj = kmem_cache_zalloc(base_cache, GFP_KERNEL);
239 cache->objects[cache->nobjs++] = obj;
244 static void mmu_free_memory_cache(struct kvm_mmu_memory_cache *mc)
247 kfree(mc->objects[--mc->nobjs]);
250 static int mmu_topup_memory_cache_page(struct kvm_mmu_memory_cache *cache,
255 if (cache->nobjs >= min)
257 while (cache->nobjs < ARRAY_SIZE(cache->objects)) {
258 page = alloc_page(GFP_KERNEL);
261 set_page_private(page, 0);
262 cache->objects[cache->nobjs++] = page_address(page);
267 static void mmu_free_memory_cache_page(struct kvm_mmu_memory_cache *mc)
270 free_page((unsigned long)mc->objects[--mc->nobjs]);
273 static int mmu_topup_memory_caches(struct kvm_vcpu *vcpu)
277 kvm_mmu_free_some_pages(vcpu);
278 r = mmu_topup_memory_cache(&vcpu->mmu_pte_chain_cache,
282 r = mmu_topup_memory_cache(&vcpu->mmu_rmap_desc_cache,
286 r = mmu_topup_memory_cache_page(&vcpu->mmu_page_cache, 8);
289 r = mmu_topup_memory_cache(&vcpu->mmu_page_header_cache,
290 mmu_page_header_cache, 4);
295 static void mmu_free_memory_caches(struct kvm_vcpu *vcpu)
297 mmu_free_memory_cache(&vcpu->mmu_pte_chain_cache);
298 mmu_free_memory_cache(&vcpu->mmu_rmap_desc_cache);
299 mmu_free_memory_cache_page(&vcpu->mmu_page_cache);
300 mmu_free_memory_cache(&vcpu->mmu_page_header_cache);
303 static void *mmu_memory_cache_alloc(struct kvm_mmu_memory_cache *mc,
309 p = mc->objects[--mc->nobjs];
314 static struct kvm_pte_chain *mmu_alloc_pte_chain(struct kvm_vcpu *vcpu)
316 return mmu_memory_cache_alloc(&vcpu->mmu_pte_chain_cache,
317 sizeof(struct kvm_pte_chain));
320 static void mmu_free_pte_chain(struct kvm_pte_chain *pc)
325 static struct kvm_rmap_desc *mmu_alloc_rmap_desc(struct kvm_vcpu *vcpu)
327 return mmu_memory_cache_alloc(&vcpu->mmu_rmap_desc_cache,
328 sizeof(struct kvm_rmap_desc));
331 static void mmu_free_rmap_desc(struct kvm_rmap_desc *rd)
337 * Take gfn and return the reverse mapping to it.
338 * Note: gfn must be unaliased before this function get called
341 static unsigned long *gfn_to_rmap(struct kvm *kvm, gfn_t gfn)
343 struct kvm_memory_slot *slot;
345 slot = gfn_to_memslot(kvm, gfn);
346 return &slot->rmap[gfn - slot->base_gfn];
350 * Reverse mapping data structures:
352 * If rmapp bit zero is zero, then rmapp point to the shadw page table entry
353 * that points to page_address(page).
355 * If rmapp bit zero is one, (then rmap & ~1) points to a struct kvm_rmap_desc
356 * containing more mappings.
358 static void rmap_add(struct kvm_vcpu *vcpu, u64 *spte, gfn_t gfn)
360 struct kvm_mmu_page *page;
361 struct kvm_rmap_desc *desc;
362 unsigned long *rmapp;
365 if (!is_rmap_pte(*spte))
367 gfn = unalias_gfn(vcpu->kvm, gfn);
368 page = page_header(__pa(spte));
369 page->gfns[spte - page->spt] = gfn;
370 rmapp = gfn_to_rmap(vcpu->kvm, gfn);
372 rmap_printk("rmap_add: %p %llx 0->1\n", spte, *spte);
373 *rmapp = (unsigned long)spte;
374 } else if (!(*rmapp & 1)) {
375 rmap_printk("rmap_add: %p %llx 1->many\n", spte, *spte);
376 desc = mmu_alloc_rmap_desc(vcpu);
377 desc->shadow_ptes[0] = (u64 *)*rmapp;
378 desc->shadow_ptes[1] = spte;
379 *rmapp = (unsigned long)desc | 1;
381 rmap_printk("rmap_add: %p %llx many->many\n", spte, *spte);
382 desc = (struct kvm_rmap_desc *)(*rmapp & ~1ul);
383 while (desc->shadow_ptes[RMAP_EXT-1] && desc->more)
385 if (desc->shadow_ptes[RMAP_EXT-1]) {
386 desc->more = mmu_alloc_rmap_desc(vcpu);
389 for (i = 0; desc->shadow_ptes[i]; ++i)
391 desc->shadow_ptes[i] = spte;
395 static void rmap_desc_remove_entry(unsigned long *rmapp,
396 struct kvm_rmap_desc *desc,
398 struct kvm_rmap_desc *prev_desc)
402 for (j = RMAP_EXT - 1; !desc->shadow_ptes[j] && j > i; --j)
404 desc->shadow_ptes[i] = desc->shadow_ptes[j];
405 desc->shadow_ptes[j] = NULL;
408 if (!prev_desc && !desc->more)
409 *rmapp = (unsigned long)desc->shadow_ptes[0];
412 prev_desc->more = desc->more;
414 *rmapp = (unsigned long)desc->more | 1;
415 mmu_free_rmap_desc(desc);
418 static void rmap_remove(struct kvm *kvm, u64 *spte)
420 struct kvm_rmap_desc *desc;
421 struct kvm_rmap_desc *prev_desc;
422 struct kvm_mmu_page *page;
423 unsigned long *rmapp;
426 if (!is_rmap_pte(*spte))
428 page = page_header(__pa(spte));
429 kvm_release_page(pfn_to_page((*spte & PT64_BASE_ADDR_MASK) >>
431 rmapp = gfn_to_rmap(kvm, page->gfns[spte - page->spt]);
433 printk(KERN_ERR "rmap_remove: %p %llx 0->BUG\n", spte, *spte);
435 } else if (!(*rmapp & 1)) {
436 rmap_printk("rmap_remove: %p %llx 1->0\n", spte, *spte);
437 if ((u64 *)*rmapp != spte) {
438 printk(KERN_ERR "rmap_remove: %p %llx 1->BUG\n",
444 rmap_printk("rmap_remove: %p %llx many->many\n", spte, *spte);
445 desc = (struct kvm_rmap_desc *)(*rmapp & ~1ul);
448 for (i = 0; i < RMAP_EXT && desc->shadow_ptes[i]; ++i)
449 if (desc->shadow_ptes[i] == spte) {
450 rmap_desc_remove_entry(rmapp,
462 static u64 *rmap_next(struct kvm *kvm, unsigned long *rmapp, u64 *spte)
464 struct kvm_rmap_desc *desc;
465 struct kvm_rmap_desc *prev_desc;
471 else if (!(*rmapp & 1)) {
473 return (u64 *)*rmapp;
476 desc = (struct kvm_rmap_desc *)(*rmapp & ~1ul);
480 for (i = 0; i < RMAP_EXT && desc->shadow_ptes[i]; ++i) {
481 if (prev_spte == spte)
482 return desc->shadow_ptes[i];
483 prev_spte = desc->shadow_ptes[i];
490 static void rmap_write_protect(struct kvm *kvm, u64 gfn)
492 unsigned long *rmapp;
495 gfn = unalias_gfn(kvm, gfn);
496 rmapp = gfn_to_rmap(kvm, gfn);
498 spte = rmap_next(kvm, rmapp, NULL);
501 BUG_ON(!(*spte & PT_PRESENT_MASK));
502 rmap_printk("rmap_write_protect: spte %p %llx\n", spte, *spte);
503 if (is_writeble_pte(*spte))
504 set_shadow_pte(spte, *spte & ~PT_WRITABLE_MASK);
505 kvm_flush_remote_tlbs(kvm);
506 spte = rmap_next(kvm, rmapp, spte);
511 static int is_empty_shadow_page(u64 *spt)
516 for (pos = spt, end = pos + PAGE_SIZE / sizeof(u64); pos != end; pos++)
517 if ((*pos & ~PT_SHADOW_IO_MARK) != shadow_trap_nonpresent_pte) {
518 printk(KERN_ERR "%s: %p %llx\n", __FUNCTION__,
526 static void kvm_mmu_free_page(struct kvm *kvm,
527 struct kvm_mmu_page *page_head)
529 ASSERT(is_empty_shadow_page(page_head->spt));
530 list_del(&page_head->link);
531 __free_page(virt_to_page(page_head->spt));
532 __free_page(virt_to_page(page_head->gfns));
534 ++kvm->n_free_mmu_pages;
537 static unsigned kvm_page_table_hashfn(gfn_t gfn)
542 static struct kvm_mmu_page *kvm_mmu_alloc_page(struct kvm_vcpu *vcpu,
545 struct kvm_mmu_page *page;
547 if (!vcpu->kvm->n_free_mmu_pages)
550 page = mmu_memory_cache_alloc(&vcpu->mmu_page_header_cache,
552 page->spt = mmu_memory_cache_alloc(&vcpu->mmu_page_cache, PAGE_SIZE);
553 page->gfns = mmu_memory_cache_alloc(&vcpu->mmu_page_cache, PAGE_SIZE);
554 set_page_private(virt_to_page(page->spt), (unsigned long)page);
555 list_add(&page->link, &vcpu->kvm->active_mmu_pages);
556 ASSERT(is_empty_shadow_page(page->spt));
557 page->slot_bitmap = 0;
558 page->multimapped = 0;
559 page->parent_pte = parent_pte;
560 --vcpu->kvm->n_free_mmu_pages;
564 static void mmu_page_add_parent_pte(struct kvm_vcpu *vcpu,
565 struct kvm_mmu_page *page, u64 *parent_pte)
567 struct kvm_pte_chain *pte_chain;
568 struct hlist_node *node;
573 if (!page->multimapped) {
574 u64 *old = page->parent_pte;
577 page->parent_pte = parent_pte;
580 page->multimapped = 1;
581 pte_chain = mmu_alloc_pte_chain(vcpu);
582 INIT_HLIST_HEAD(&page->parent_ptes);
583 hlist_add_head(&pte_chain->link, &page->parent_ptes);
584 pte_chain->parent_ptes[0] = old;
586 hlist_for_each_entry(pte_chain, node, &page->parent_ptes, link) {
587 if (pte_chain->parent_ptes[NR_PTE_CHAIN_ENTRIES-1])
589 for (i = 0; i < NR_PTE_CHAIN_ENTRIES; ++i)
590 if (!pte_chain->parent_ptes[i]) {
591 pte_chain->parent_ptes[i] = parent_pte;
595 pte_chain = mmu_alloc_pte_chain(vcpu);
597 hlist_add_head(&pte_chain->link, &page->parent_ptes);
598 pte_chain->parent_ptes[0] = parent_pte;
601 static void mmu_page_remove_parent_pte(struct kvm_mmu_page *page,
604 struct kvm_pte_chain *pte_chain;
605 struct hlist_node *node;
608 if (!page->multimapped) {
609 BUG_ON(page->parent_pte != parent_pte);
610 page->parent_pte = NULL;
613 hlist_for_each_entry(pte_chain, node, &page->parent_ptes, link)
614 for (i = 0; i < NR_PTE_CHAIN_ENTRIES; ++i) {
615 if (!pte_chain->parent_ptes[i])
617 if (pte_chain->parent_ptes[i] != parent_pte)
619 while (i + 1 < NR_PTE_CHAIN_ENTRIES
620 && pte_chain->parent_ptes[i + 1]) {
621 pte_chain->parent_ptes[i]
622 = pte_chain->parent_ptes[i + 1];
625 pte_chain->parent_ptes[i] = NULL;
627 hlist_del(&pte_chain->link);
628 mmu_free_pte_chain(pte_chain);
629 if (hlist_empty(&page->parent_ptes)) {
630 page->multimapped = 0;
631 page->parent_pte = NULL;
639 static struct kvm_mmu_page *kvm_mmu_lookup_page(struct kvm *kvm,
643 struct hlist_head *bucket;
644 struct kvm_mmu_page *page;
645 struct hlist_node *node;
647 pgprintk("%s: looking for gfn %lx\n", __FUNCTION__, gfn);
648 index = kvm_page_table_hashfn(gfn) % KVM_NUM_MMU_PAGES;
649 bucket = &kvm->mmu_page_hash[index];
650 hlist_for_each_entry(page, node, bucket, hash_link)
651 if (page->gfn == gfn && !page->role.metaphysical) {
652 pgprintk("%s: found role %x\n",
653 __FUNCTION__, page->role.word);
659 static struct kvm_mmu_page *kvm_mmu_get_page(struct kvm_vcpu *vcpu,
664 unsigned hugepage_access,
667 union kvm_mmu_page_role role;
670 struct hlist_head *bucket;
671 struct kvm_mmu_page *page;
672 struct hlist_node *node;
675 role.glevels = vcpu->mmu.root_level;
677 role.metaphysical = metaphysical;
678 role.hugepage_access = hugepage_access;
679 if (vcpu->mmu.root_level <= PT32_ROOT_LEVEL) {
680 quadrant = gaddr >> (PAGE_SHIFT + (PT64_PT_BITS * level));
681 quadrant &= (1 << ((PT32_PT_BITS - PT64_PT_BITS) * level)) - 1;
682 role.quadrant = quadrant;
684 pgprintk("%s: looking gfn %lx role %x\n", __FUNCTION__,
686 index = kvm_page_table_hashfn(gfn) % KVM_NUM_MMU_PAGES;
687 bucket = &vcpu->kvm->mmu_page_hash[index];
688 hlist_for_each_entry(page, node, bucket, hash_link)
689 if (page->gfn == gfn && page->role.word == role.word) {
690 mmu_page_add_parent_pte(vcpu, page, parent_pte);
691 pgprintk("%s: found\n", __FUNCTION__);
694 page = kvm_mmu_alloc_page(vcpu, parent_pte);
697 pgprintk("%s: adding gfn %lx role %x\n", __FUNCTION__, gfn, role.word);
700 hlist_add_head(&page->hash_link, bucket);
701 vcpu->mmu.prefetch_page(vcpu, page);
703 rmap_write_protect(vcpu->kvm, gfn);
707 static void kvm_mmu_page_unlink_children(struct kvm *kvm,
708 struct kvm_mmu_page *page)
716 if (page->role.level == PT_PAGE_TABLE_LEVEL) {
717 for (i = 0; i < PT64_ENT_PER_PAGE; ++i) {
718 if (is_shadow_present_pte(pt[i]))
719 rmap_remove(kvm, &pt[i]);
720 pt[i] = shadow_trap_nonpresent_pte;
722 kvm_flush_remote_tlbs(kvm);
726 for (i = 0; i < PT64_ENT_PER_PAGE; ++i) {
729 pt[i] = shadow_trap_nonpresent_pte;
730 if (!is_shadow_present_pte(ent))
732 ent &= PT64_BASE_ADDR_MASK;
733 mmu_page_remove_parent_pte(page_header(ent), &pt[i]);
735 kvm_flush_remote_tlbs(kvm);
738 static void kvm_mmu_put_page(struct kvm_mmu_page *page,
741 mmu_page_remove_parent_pte(page, parent_pte);
744 static void kvm_mmu_reset_last_pte_updated(struct kvm *kvm)
748 for (i = 0; i < KVM_MAX_VCPUS; ++i)
750 kvm->vcpus[i]->last_pte_updated = NULL;
753 static void kvm_mmu_zap_page(struct kvm *kvm,
754 struct kvm_mmu_page *page)
758 while (page->multimapped || page->parent_pte) {
759 if (!page->multimapped)
760 parent_pte = page->parent_pte;
762 struct kvm_pte_chain *chain;
764 chain = container_of(page->parent_ptes.first,
765 struct kvm_pte_chain, link);
766 parent_pte = chain->parent_ptes[0];
769 kvm_mmu_put_page(page, parent_pte);
770 set_shadow_pte(parent_pte, shadow_trap_nonpresent_pte);
772 kvm_mmu_page_unlink_children(kvm, page);
773 if (!page->root_count) {
774 hlist_del(&page->hash_link);
775 kvm_mmu_free_page(kvm, page);
777 list_move(&page->link, &kvm->active_mmu_pages);
778 kvm_mmu_reset_last_pte_updated(kvm);
782 * Changing the number of mmu pages allocated to the vm
783 * Note: if kvm_nr_mmu_pages is too small, you will get dead lock
785 void kvm_mmu_change_mmu_pages(struct kvm *kvm, unsigned int kvm_nr_mmu_pages)
788 * If we set the number of mmu pages to be smaller be than the
789 * number of actived pages , we must to free some mmu pages before we
793 if ((kvm->n_alloc_mmu_pages - kvm->n_free_mmu_pages) >
795 int n_used_mmu_pages = kvm->n_alloc_mmu_pages
796 - kvm->n_free_mmu_pages;
798 while (n_used_mmu_pages > kvm_nr_mmu_pages) {
799 struct kvm_mmu_page *page;
801 page = container_of(kvm->active_mmu_pages.prev,
802 struct kvm_mmu_page, link);
803 kvm_mmu_zap_page(kvm, page);
806 kvm->n_free_mmu_pages = 0;
809 kvm->n_free_mmu_pages += kvm_nr_mmu_pages
810 - kvm->n_alloc_mmu_pages;
812 kvm->n_alloc_mmu_pages = kvm_nr_mmu_pages;
815 static int kvm_mmu_unprotect_page(struct kvm *kvm, gfn_t gfn)
818 struct hlist_head *bucket;
819 struct kvm_mmu_page *page;
820 struct hlist_node *node, *n;
823 pgprintk("%s: looking for gfn %lx\n", __FUNCTION__, gfn);
825 index = kvm_page_table_hashfn(gfn) % KVM_NUM_MMU_PAGES;
826 bucket = &kvm->mmu_page_hash[index];
827 hlist_for_each_entry_safe(page, node, n, bucket, hash_link)
828 if (page->gfn == gfn && !page->role.metaphysical) {
829 pgprintk("%s: gfn %lx role %x\n", __FUNCTION__, gfn,
831 kvm_mmu_zap_page(kvm, page);
837 static void mmu_unshadow(struct kvm *kvm, gfn_t gfn)
839 struct kvm_mmu_page *page;
841 while ((page = kvm_mmu_lookup_page(kvm, gfn)) != NULL) {
842 pgprintk("%s: zap %lx %x\n",
843 __FUNCTION__, gfn, page->role.word);
844 kvm_mmu_zap_page(kvm, page);
848 static void page_header_update_slot(struct kvm *kvm, void *pte, gpa_t gpa)
850 int slot = memslot_id(kvm, gfn_to_memslot(kvm, gpa >> PAGE_SHIFT));
851 struct kvm_mmu_page *page_head = page_header(__pa(pte));
853 __set_bit(slot, &page_head->slot_bitmap);
856 hpa_t gpa_to_hpa(struct kvm *kvm, gpa_t gpa)
861 ASSERT((gpa & HPA_ERR_MASK) == 0);
862 page = gfn_to_page(kvm, gpa >> PAGE_SHIFT);
863 hpa = ((hpa_t)page_to_pfn(page) << PAGE_SHIFT) | (gpa & (PAGE_SIZE-1));
864 if (is_error_page(page))
865 return hpa | HPA_ERR_MASK;
869 hpa_t gva_to_hpa(struct kvm_vcpu *vcpu, gva_t gva)
871 gpa_t gpa = vcpu->mmu.gva_to_gpa(vcpu, gva);
873 if (gpa == UNMAPPED_GVA)
875 return gpa_to_hpa(vcpu->kvm, gpa);
878 struct page *gva_to_page(struct kvm_vcpu *vcpu, gva_t gva)
880 gpa_t gpa = vcpu->mmu.gva_to_gpa(vcpu, gva);
882 if (gpa == UNMAPPED_GVA)
884 return pfn_to_page(gpa_to_hpa(vcpu->kvm, gpa) >> PAGE_SHIFT);
887 static void nonpaging_new_cr3(struct kvm_vcpu *vcpu)
891 static int nonpaging_map(struct kvm_vcpu *vcpu, gva_t v, hpa_t p)
893 int level = PT32E_ROOT_LEVEL;
894 hpa_t table_addr = vcpu->mmu.root_hpa;
897 u32 index = PT64_INDEX(v, level);
901 ASSERT(VALID_PAGE(table_addr));
902 table = __va(table_addr);
908 was_rmapped = is_rmap_pte(pte);
909 if (is_shadow_present_pte(pte) && is_writeble_pte(pte))
911 mark_page_dirty(vcpu->kvm, v >> PAGE_SHIFT);
912 page_header_update_slot(vcpu->kvm, table, v);
913 table[index] = p | PT_PRESENT_MASK | PT_WRITABLE_MASK |
916 rmap_add(vcpu, &table[index], v >> PAGE_SHIFT);
918 kvm_release_page(pfn_to_page(p >> PAGE_SHIFT));
922 if (table[index] == shadow_trap_nonpresent_pte) {
923 struct kvm_mmu_page *new_table;
926 pseudo_gfn = (v & PT64_DIR_BASE_ADDR_MASK)
928 new_table = kvm_mmu_get_page(vcpu, pseudo_gfn,
930 1, 3, &table[index]);
932 pgprintk("nonpaging_map: ENOMEM\n");
933 kvm_release_page(pfn_to_page(p >> PAGE_SHIFT));
937 table[index] = __pa(new_table->spt) | PT_PRESENT_MASK
938 | PT_WRITABLE_MASK | PT_USER_MASK;
940 table_addr = table[index] & PT64_BASE_ADDR_MASK;
944 static void nonpaging_prefetch_page(struct kvm_vcpu *vcpu,
945 struct kvm_mmu_page *sp)
949 for (i = 0; i < PT64_ENT_PER_PAGE; ++i)
950 sp->spt[i] = shadow_trap_nonpresent_pte;
953 static void mmu_free_roots(struct kvm_vcpu *vcpu)
956 struct kvm_mmu_page *page;
958 if (!VALID_PAGE(vcpu->mmu.root_hpa))
961 if (vcpu->mmu.shadow_root_level == PT64_ROOT_LEVEL) {
962 hpa_t root = vcpu->mmu.root_hpa;
964 page = page_header(root);
966 vcpu->mmu.root_hpa = INVALID_PAGE;
970 for (i = 0; i < 4; ++i) {
971 hpa_t root = vcpu->mmu.pae_root[i];
974 root &= PT64_BASE_ADDR_MASK;
975 page = page_header(root);
978 vcpu->mmu.pae_root[i] = INVALID_PAGE;
980 vcpu->mmu.root_hpa = INVALID_PAGE;
983 static void mmu_alloc_roots(struct kvm_vcpu *vcpu)
987 struct kvm_mmu_page *page;
989 root_gfn = vcpu->cr3 >> PAGE_SHIFT;
992 if (vcpu->mmu.shadow_root_level == PT64_ROOT_LEVEL) {
993 hpa_t root = vcpu->mmu.root_hpa;
995 ASSERT(!VALID_PAGE(root));
996 page = kvm_mmu_get_page(vcpu, root_gfn, 0,
997 PT64_ROOT_LEVEL, 0, 0, NULL);
998 root = __pa(page->spt);
1000 vcpu->mmu.root_hpa = root;
1004 for (i = 0; i < 4; ++i) {
1005 hpa_t root = vcpu->mmu.pae_root[i];
1007 ASSERT(!VALID_PAGE(root));
1008 if (vcpu->mmu.root_level == PT32E_ROOT_LEVEL) {
1009 if (!is_present_pte(vcpu->pdptrs[i])) {
1010 vcpu->mmu.pae_root[i] = 0;
1013 root_gfn = vcpu->pdptrs[i] >> PAGE_SHIFT;
1014 } else if (vcpu->mmu.root_level == 0)
1016 page = kvm_mmu_get_page(vcpu, root_gfn, i << 30,
1017 PT32_ROOT_LEVEL, !is_paging(vcpu),
1019 root = __pa(page->spt);
1021 vcpu->mmu.pae_root[i] = root | PT_PRESENT_MASK;
1023 vcpu->mmu.root_hpa = __pa(vcpu->mmu.pae_root);
1026 static gpa_t nonpaging_gva_to_gpa(struct kvm_vcpu *vcpu, gva_t vaddr)
1031 static int nonpaging_page_fault(struct kvm_vcpu *vcpu, gva_t gva,
1038 r = mmu_topup_memory_caches(vcpu);
1043 ASSERT(VALID_PAGE(vcpu->mmu.root_hpa));
1046 paddr = gpa_to_hpa(vcpu->kvm, addr & PT64_BASE_ADDR_MASK);
1048 if (is_error_hpa(paddr)) {
1049 kvm_release_page(pfn_to_page((paddr & PT64_BASE_ADDR_MASK)
1054 return nonpaging_map(vcpu, addr & PAGE_MASK, paddr);
1057 static void nonpaging_free(struct kvm_vcpu *vcpu)
1059 mmu_free_roots(vcpu);
1062 static int nonpaging_init_context(struct kvm_vcpu *vcpu)
1064 struct kvm_mmu *context = &vcpu->mmu;
1066 context->new_cr3 = nonpaging_new_cr3;
1067 context->page_fault = nonpaging_page_fault;
1068 context->gva_to_gpa = nonpaging_gva_to_gpa;
1069 context->free = nonpaging_free;
1070 context->prefetch_page = nonpaging_prefetch_page;
1071 context->root_level = 0;
1072 context->shadow_root_level = PT32E_ROOT_LEVEL;
1073 context->root_hpa = INVALID_PAGE;
1077 static void kvm_mmu_flush_tlb(struct kvm_vcpu *vcpu)
1079 ++vcpu->stat.tlb_flush;
1080 kvm_x86_ops->tlb_flush(vcpu);
1083 static void paging_new_cr3(struct kvm_vcpu *vcpu)
1085 pgprintk("%s: cr3 %lx\n", __FUNCTION__, vcpu->cr3);
1086 mmu_free_roots(vcpu);
1089 static void inject_page_fault(struct kvm_vcpu *vcpu,
1093 kvm_x86_ops->inject_page_fault(vcpu, addr, err_code);
1096 static void paging_free(struct kvm_vcpu *vcpu)
1098 nonpaging_free(vcpu);
1102 #include "paging_tmpl.h"
1106 #include "paging_tmpl.h"
1109 static int paging64_init_context_common(struct kvm_vcpu *vcpu, int level)
1111 struct kvm_mmu *context = &vcpu->mmu;
1113 ASSERT(is_pae(vcpu));
1114 context->new_cr3 = paging_new_cr3;
1115 context->page_fault = paging64_page_fault;
1116 context->gva_to_gpa = paging64_gva_to_gpa;
1117 context->prefetch_page = paging64_prefetch_page;
1118 context->free = paging_free;
1119 context->root_level = level;
1120 context->shadow_root_level = level;
1121 context->root_hpa = INVALID_PAGE;
1125 static int paging64_init_context(struct kvm_vcpu *vcpu)
1127 return paging64_init_context_common(vcpu, PT64_ROOT_LEVEL);
1130 static int paging32_init_context(struct kvm_vcpu *vcpu)
1132 struct kvm_mmu *context = &vcpu->mmu;
1134 context->new_cr3 = paging_new_cr3;
1135 context->page_fault = paging32_page_fault;
1136 context->gva_to_gpa = paging32_gva_to_gpa;
1137 context->free = paging_free;
1138 context->prefetch_page = paging32_prefetch_page;
1139 context->root_level = PT32_ROOT_LEVEL;
1140 context->shadow_root_level = PT32E_ROOT_LEVEL;
1141 context->root_hpa = INVALID_PAGE;
1145 static int paging32E_init_context(struct kvm_vcpu *vcpu)
1147 return paging64_init_context_common(vcpu, PT32E_ROOT_LEVEL);
1150 static int init_kvm_mmu(struct kvm_vcpu *vcpu)
1153 ASSERT(!VALID_PAGE(vcpu->mmu.root_hpa));
1155 if (!is_paging(vcpu))
1156 return nonpaging_init_context(vcpu);
1157 else if (is_long_mode(vcpu))
1158 return paging64_init_context(vcpu);
1159 else if (is_pae(vcpu))
1160 return paging32E_init_context(vcpu);
1162 return paging32_init_context(vcpu);
1165 static void destroy_kvm_mmu(struct kvm_vcpu *vcpu)
1168 if (VALID_PAGE(vcpu->mmu.root_hpa)) {
1169 vcpu->mmu.free(vcpu);
1170 vcpu->mmu.root_hpa = INVALID_PAGE;
1174 int kvm_mmu_reset_context(struct kvm_vcpu *vcpu)
1176 destroy_kvm_mmu(vcpu);
1177 return init_kvm_mmu(vcpu);
1179 EXPORT_SYMBOL_GPL(kvm_mmu_reset_context);
1181 int kvm_mmu_load(struct kvm_vcpu *vcpu)
1185 mutex_lock(&vcpu->kvm->lock);
1186 r = mmu_topup_memory_caches(vcpu);
1189 mmu_alloc_roots(vcpu);
1190 kvm_x86_ops->set_cr3(vcpu, vcpu->mmu.root_hpa);
1191 kvm_mmu_flush_tlb(vcpu);
1193 mutex_unlock(&vcpu->kvm->lock);
1196 EXPORT_SYMBOL_GPL(kvm_mmu_load);
1198 void kvm_mmu_unload(struct kvm_vcpu *vcpu)
1200 mmu_free_roots(vcpu);
1203 static void mmu_pte_write_zap_pte(struct kvm_vcpu *vcpu,
1204 struct kvm_mmu_page *page,
1208 struct kvm_mmu_page *child;
1211 if (is_shadow_present_pte(pte)) {
1212 if (page->role.level == PT_PAGE_TABLE_LEVEL)
1213 rmap_remove(vcpu->kvm, spte);
1215 child = page_header(pte & PT64_BASE_ADDR_MASK);
1216 mmu_page_remove_parent_pte(child, spte);
1219 set_shadow_pte(spte, shadow_trap_nonpresent_pte);
1220 kvm_flush_remote_tlbs(vcpu->kvm);
1223 static void mmu_pte_write_new_pte(struct kvm_vcpu *vcpu,
1224 struct kvm_mmu_page *page,
1226 const void *new, int bytes,
1229 if (page->role.level != PT_PAGE_TABLE_LEVEL)
1232 if (page->role.glevels == PT32_ROOT_LEVEL)
1233 paging32_update_pte(vcpu, page, spte, new, bytes,
1236 paging64_update_pte(vcpu, page, spte, new, bytes,
1240 static bool last_updated_pte_accessed(struct kvm_vcpu *vcpu)
1242 u64 *spte = vcpu->last_pte_updated;
1244 return !!(spte && (*spte & PT_ACCESSED_MASK));
1247 void kvm_mmu_pte_write(struct kvm_vcpu *vcpu, gpa_t gpa,
1248 const u8 *new, int bytes)
1250 gfn_t gfn = gpa >> PAGE_SHIFT;
1251 struct kvm_mmu_page *page;
1252 struct hlist_node *node, *n;
1253 struct hlist_head *bucket;
1256 unsigned offset = offset_in_page(gpa);
1258 unsigned page_offset;
1259 unsigned misaligned;
1265 pgprintk("%s: gpa %llx bytes %d\n", __FUNCTION__, gpa, bytes);
1266 kvm_mmu_audit(vcpu, "pre pte write");
1267 if (gfn == vcpu->last_pt_write_gfn
1268 && !last_updated_pte_accessed(vcpu)) {
1269 ++vcpu->last_pt_write_count;
1270 if (vcpu->last_pt_write_count >= 3)
1273 vcpu->last_pt_write_gfn = gfn;
1274 vcpu->last_pt_write_count = 1;
1275 vcpu->last_pte_updated = NULL;
1277 index = kvm_page_table_hashfn(gfn) % KVM_NUM_MMU_PAGES;
1278 bucket = &vcpu->kvm->mmu_page_hash[index];
1279 hlist_for_each_entry_safe(page, node, n, bucket, hash_link) {
1280 if (page->gfn != gfn || page->role.metaphysical)
1282 pte_size = page->role.glevels == PT32_ROOT_LEVEL ? 4 : 8;
1283 misaligned = (offset ^ (offset + bytes - 1)) & ~(pte_size - 1);
1284 misaligned |= bytes < 4;
1285 if (misaligned || flooded) {
1287 * Misaligned accesses are too much trouble to fix
1288 * up; also, they usually indicate a page is not used
1291 * If we're seeing too many writes to a page,
1292 * it may no longer be a page table, or we may be
1293 * forking, in which case it is better to unmap the
1296 pgprintk("misaligned: gpa %llx bytes %d role %x\n",
1297 gpa, bytes, page->role.word);
1298 kvm_mmu_zap_page(vcpu->kvm, page);
1301 page_offset = offset;
1302 level = page->role.level;
1304 if (page->role.glevels == PT32_ROOT_LEVEL) {
1305 page_offset <<= 1; /* 32->64 */
1307 * A 32-bit pde maps 4MB while the shadow pdes map
1308 * only 2MB. So we need to double the offset again
1309 * and zap two pdes instead of one.
1311 if (level == PT32_ROOT_LEVEL) {
1312 page_offset &= ~7; /* kill rounding error */
1316 quadrant = page_offset >> PAGE_SHIFT;
1317 page_offset &= ~PAGE_MASK;
1318 if (quadrant != page->role.quadrant)
1321 spte = &page->spt[page_offset / sizeof(*spte)];
1323 mmu_pte_write_zap_pte(vcpu, page, spte);
1324 mmu_pte_write_new_pte(vcpu, page, spte, new, bytes,
1325 page_offset & (pte_size - 1));
1329 kvm_mmu_audit(vcpu, "post pte write");
1332 int kvm_mmu_unprotect_page_virt(struct kvm_vcpu *vcpu, gva_t gva)
1334 gpa_t gpa = vcpu->mmu.gva_to_gpa(vcpu, gva);
1336 return kvm_mmu_unprotect_page(vcpu->kvm, gpa >> PAGE_SHIFT);
1339 void __kvm_mmu_free_some_pages(struct kvm_vcpu *vcpu)
1341 while (vcpu->kvm->n_free_mmu_pages < KVM_REFILL_PAGES) {
1342 struct kvm_mmu_page *page;
1344 page = container_of(vcpu->kvm->active_mmu_pages.prev,
1345 struct kvm_mmu_page, link);
1346 kvm_mmu_zap_page(vcpu->kvm, page);
1350 int kvm_mmu_page_fault(struct kvm_vcpu *vcpu, gva_t cr2, u32 error_code)
1353 enum emulation_result er;
1355 mutex_lock(&vcpu->kvm->lock);
1356 r = vcpu->mmu.page_fault(vcpu, cr2, error_code);
1365 r = mmu_topup_memory_caches(vcpu);
1369 er = emulate_instruction(vcpu, vcpu->run, cr2, error_code, 0);
1370 mutex_unlock(&vcpu->kvm->lock);
1375 case EMULATE_DO_MMIO:
1376 ++vcpu->stat.mmio_exits;
1379 kvm_report_emulation_failure(vcpu, "pagetable");
1385 mutex_unlock(&vcpu->kvm->lock);
1388 EXPORT_SYMBOL_GPL(kvm_mmu_page_fault);
1390 static void free_mmu_pages(struct kvm_vcpu *vcpu)
1392 struct kvm_mmu_page *page;
1394 while (!list_empty(&vcpu->kvm->active_mmu_pages)) {
1395 page = container_of(vcpu->kvm->active_mmu_pages.next,
1396 struct kvm_mmu_page, link);
1397 kvm_mmu_zap_page(vcpu->kvm, page);
1399 free_page((unsigned long)vcpu->mmu.pae_root);
1402 static int alloc_mmu_pages(struct kvm_vcpu *vcpu)
1409 if (vcpu->kvm->n_requested_mmu_pages)
1410 vcpu->kvm->n_free_mmu_pages = vcpu->kvm->n_requested_mmu_pages;
1412 vcpu->kvm->n_free_mmu_pages = vcpu->kvm->n_alloc_mmu_pages;
1414 * When emulating 32-bit mode, cr3 is only 32 bits even on x86_64.
1415 * Therefore we need to allocate shadow page tables in the first
1416 * 4GB of memory, which happens to fit the DMA32 zone.
1418 page = alloc_page(GFP_KERNEL | __GFP_DMA32);
1421 vcpu->mmu.pae_root = page_address(page);
1422 for (i = 0; i < 4; ++i)
1423 vcpu->mmu.pae_root[i] = INVALID_PAGE;
1428 free_mmu_pages(vcpu);
1432 int kvm_mmu_create(struct kvm_vcpu *vcpu)
1435 ASSERT(!VALID_PAGE(vcpu->mmu.root_hpa));
1437 return alloc_mmu_pages(vcpu);
1440 int kvm_mmu_setup(struct kvm_vcpu *vcpu)
1443 ASSERT(!VALID_PAGE(vcpu->mmu.root_hpa));
1445 return init_kvm_mmu(vcpu);
1448 void kvm_mmu_destroy(struct kvm_vcpu *vcpu)
1452 destroy_kvm_mmu(vcpu);
1453 free_mmu_pages(vcpu);
1454 mmu_free_memory_caches(vcpu);
1457 void kvm_mmu_slot_remove_write_access(struct kvm *kvm, int slot)
1459 struct kvm_mmu_page *page;
1461 list_for_each_entry(page, &kvm->active_mmu_pages, link) {
1465 if (!test_bit(slot, &page->slot_bitmap))
1469 for (i = 0; i < PT64_ENT_PER_PAGE; ++i)
1471 if (pt[i] & PT_WRITABLE_MASK)
1472 pt[i] &= ~PT_WRITABLE_MASK;
1476 void kvm_mmu_zap_all(struct kvm *kvm)
1478 struct kvm_mmu_page *page, *node;
1480 list_for_each_entry_safe(page, node, &kvm->active_mmu_pages, link)
1481 kvm_mmu_zap_page(kvm, page);
1483 kvm_flush_remote_tlbs(kvm);
1486 void kvm_mmu_module_exit(void)
1488 if (pte_chain_cache)
1489 kmem_cache_destroy(pte_chain_cache);
1490 if (rmap_desc_cache)
1491 kmem_cache_destroy(rmap_desc_cache);
1492 if (mmu_page_header_cache)
1493 kmem_cache_destroy(mmu_page_header_cache);
1496 int kvm_mmu_module_init(void)
1498 pte_chain_cache = kmem_cache_create("kvm_pte_chain",
1499 sizeof(struct kvm_pte_chain),
1501 if (!pte_chain_cache)
1503 rmap_desc_cache = kmem_cache_create("kvm_rmap_desc",
1504 sizeof(struct kvm_rmap_desc),
1506 if (!rmap_desc_cache)
1509 mmu_page_header_cache = kmem_cache_create("kvm_mmu_page_header",
1510 sizeof(struct kvm_mmu_page),
1512 if (!mmu_page_header_cache)
1518 kvm_mmu_module_exit();
1524 static const char *audit_msg;
1526 static gva_t canonicalize(gva_t gva)
1528 #ifdef CONFIG_X86_64
1529 gva = (long long)(gva << 16) >> 16;
1534 static void audit_mappings_page(struct kvm_vcpu *vcpu, u64 page_pte,
1535 gva_t va, int level)
1537 u64 *pt = __va(page_pte & PT64_BASE_ADDR_MASK);
1539 gva_t va_delta = 1ul << (PAGE_SHIFT + 9 * (level - 1));
1541 for (i = 0; i < PT64_ENT_PER_PAGE; ++i, va += va_delta) {
1544 if (ent == shadow_trap_nonpresent_pte)
1547 va = canonicalize(va);
1549 if (ent == shadow_notrap_nonpresent_pte)
1550 printk(KERN_ERR "audit: (%s) nontrapping pte"
1551 " in nonleaf level: levels %d gva %lx"
1552 " level %d pte %llx\n", audit_msg,
1553 vcpu->mmu.root_level, va, level, ent);
1555 audit_mappings_page(vcpu, ent, va, level - 1);
1557 gpa_t gpa = vcpu->mmu.gva_to_gpa(vcpu, va);
1558 hpa_t hpa = gpa_to_hpa(vcpu, gpa);
1561 if (is_shadow_present_pte(ent)
1562 && (ent & PT64_BASE_ADDR_MASK) != hpa)
1563 printk(KERN_ERR "xx audit error: (%s) levels %d"
1564 " gva %lx gpa %llx hpa %llx ent %llx %d\n",
1565 audit_msg, vcpu->mmu.root_level,
1567 is_shadow_present_pte(ent));
1568 else if (ent == shadow_notrap_nonpresent_pte
1569 && !is_error_hpa(hpa))
1570 printk(KERN_ERR "audit: (%s) notrap shadow,"
1571 " valid guest gva %lx\n", audit_msg, va);
1572 page = pfn_to_page((gpa & PT64_BASE_ADDR_MASK)
1574 kvm_release_page(page);
1580 static void audit_mappings(struct kvm_vcpu *vcpu)
1584 if (vcpu->mmu.root_level == 4)
1585 audit_mappings_page(vcpu, vcpu->mmu.root_hpa, 0, 4);
1587 for (i = 0; i < 4; ++i)
1588 if (vcpu->mmu.pae_root[i] & PT_PRESENT_MASK)
1589 audit_mappings_page(vcpu,
1590 vcpu->mmu.pae_root[i],
1595 static int count_rmaps(struct kvm_vcpu *vcpu)
1600 for (i = 0; i < KVM_MEMORY_SLOTS; ++i) {
1601 struct kvm_memory_slot *m = &vcpu->kvm->memslots[i];
1602 struct kvm_rmap_desc *d;
1604 for (j = 0; j < m->npages; ++j) {
1605 unsigned long *rmapp = &m->rmap[j];
1609 if (!(*rmapp & 1)) {
1613 d = (struct kvm_rmap_desc *)(*rmapp & ~1ul);
1615 for (k = 0; k < RMAP_EXT; ++k)
1616 if (d->shadow_ptes[k])
1627 static int count_writable_mappings(struct kvm_vcpu *vcpu)
1630 struct kvm_mmu_page *page;
1633 list_for_each_entry(page, &vcpu->kvm->active_mmu_pages, link) {
1634 u64 *pt = page->spt;
1636 if (page->role.level != PT_PAGE_TABLE_LEVEL)
1639 for (i = 0; i < PT64_ENT_PER_PAGE; ++i) {
1642 if (!(ent & PT_PRESENT_MASK))
1644 if (!(ent & PT_WRITABLE_MASK))
1652 static void audit_rmap(struct kvm_vcpu *vcpu)
1654 int n_rmap = count_rmaps(vcpu);
1655 int n_actual = count_writable_mappings(vcpu);
1657 if (n_rmap != n_actual)
1658 printk(KERN_ERR "%s: (%s) rmap %d actual %d\n",
1659 __FUNCTION__, audit_msg, n_rmap, n_actual);
1662 static void audit_write_protection(struct kvm_vcpu *vcpu)
1664 struct kvm_mmu_page *page;
1665 struct kvm_memory_slot *slot;
1666 unsigned long *rmapp;
1669 list_for_each_entry(page, &vcpu->kvm->active_mmu_pages, link) {
1670 if (page->role.metaphysical)
1673 slot = gfn_to_memslot(vcpu->kvm, page->gfn);
1674 gfn = unalias_gfn(vcpu->kvm, page->gfn);
1675 rmapp = &slot->rmap[gfn - slot->base_gfn];
1677 printk(KERN_ERR "%s: (%s) shadow page has writable"
1678 " mappings: gfn %lx role %x\n",
1679 __FUNCTION__, audit_msg, page->gfn,
1684 static void kvm_mmu_audit(struct kvm_vcpu *vcpu, const char *msg)
1691 audit_write_protection(vcpu);
1692 audit_mappings(vcpu);