aboutsummaryrefslogtreecommitdiff
path: root/arch/x86/kvm/mmu.h
diff options
context:
space:
mode:
authorGravatar David Matlack <dmatlack@google.com> 2022-01-25 23:05:15 +0000
committerGravatar Paolo Bonzini <pbonzini@redhat.com> 2022-02-10 13:50:32 -0500
commit115111efd97c6c0e86f8b5904c6624fddcfe4f34 (patch)
treee56472f8d5376879f8961fabb462c482e4015747 /arch/x86/kvm/mmu.h
parentKVM: x86/mmu: Move SPTE writable invariant checks to a helper function (diff)
downloadlinux-115111efd97c6c0e86f8b5904c6624fddcfe4f34.tar.gz
linux-115111efd97c6c0e86f8b5904c6624fddcfe4f34.tar.bz2
linux-115111efd97c6c0e86f8b5904c6624fddcfe4f34.zip
KVM: x86/mmu: Check SPTE writable invariants when setting leaf SPTEs
Check SPTE writable invariants when setting SPTEs rather than in spte_can_locklessly_be_made_writable(). By the time KVM checks spte_can_locklessly_be_made_writable(), the SPTE has long been since corrupted. Note that these invariants only apply to shadow-present leaf SPTEs (i.e. not to MMIO SPTEs, non-leaf SPTEs, etc.). Add a comment explaining the restriction and only instrument the code paths that set shadow-present leaf SPTEs. To account for access tracking, also check the SPTE writable invariants when marking an SPTE as an access track SPTE. This also lets us remove a redundant WARN from mark_spte_for_access_track(). Suggested-by: Sean Christopherson <seanjc@google.com> Signed-off-by: David Matlack <dmatlack@google.com> Message-Id: <20220125230518.1697048-3-dmatlack@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/kvm/mmu.h')
0 files changed, 0 insertions, 0 deletions