From patchwork Mon Jan 23 10:43:11 2012 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Takuya Yoshikawa X-Patchwork-Id: 137333 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 5E6DBB6FAC for ; Mon, 23 Jan 2012 21:37:13 +1100 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753152Ab2AWKhM (ORCPT ); Mon, 23 Jan 2012 05:37:12 -0500 Received: from serv2.oss.ntt.co.jp ([222.151.198.100]:44982 "EHLO serv2.oss.ntt.co.jp" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753144Ab2AWKhL (ORCPT ); Mon, 23 Jan 2012 05:37:11 -0500 Received: from serv2.oss.ntt.co.jp (localhost [127.0.0.1]) by serv2.oss.ntt.co.jp (Postfix) with ESMTP id E9DA02483B3; Mon, 23 Jan 2012 19:37:10 +0900 (JST) Received: from serv1.oss.ntt.co.jp (serv1.oss.ntt.co.jp [172.19.0.2]) by serv2.oss.ntt.co.jp (Postfix) with ESMTP id D88042482B2; Mon, 23 Jan 2012 19:37:10 +0900 (JST) Received: from yshpad (unknown [172.17.2.27]) by serv1.oss.ntt.co.jp (Postfix) with SMTP id C4F91260436; Mon, 23 Jan 2012 19:37:10 +0900 (JST) Date: Mon, 23 Jan 2012 19:43:11 +0900 From: Takuya Yoshikawa To: avi@redhat.com, mtosatti@redhat.com Cc: kvm@vger.kernel.org, kvm-ppc@vger.kernel.org Subject: [PATCH 1/4] KVM: MMU: Use gfn_to_rmap() in audit_write_protection() Message-Id: <20120123194311.c8abacde.yoshikawa.takuya@oss.ntt.co.jp> In-Reply-To: <20120123194204.268410c4.yoshikawa.takuya@oss.ntt.co.jp> References: <20120123194204.268410c4.yoshikawa.takuya@oss.ntt.co.jp> X-Mailer: Sylpheed 3.1.0 (GTK+ 2.24.4; x86_64-pc-linux-gnu) Mime-Version: 1.0 Sender: kvm-ppc-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm-ppc@vger.kernel.org We want to eliminate direct access to the rmap array. Signed-off-by: Takuya Yoshikawa --- arch/x86/kvm/mmu_audit.c | 4 +--- 1 files changed, 1 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/mmu_audit.c b/arch/x86/kvm/mmu_audit.c index 6eabae3..e62fa4f 100644 --- a/arch/x86/kvm/mmu_audit.c +++ b/arch/x86/kvm/mmu_audit.c @@ -190,15 +190,13 @@ static void check_mappings_rmap(struct kvm *kvm, struct kvm_mmu_page *sp) static void audit_write_protection(struct kvm *kvm, struct kvm_mmu_page *sp) { - struct kvm_memory_slot *slot; unsigned long *rmapp; u64 *spte; if (sp->role.direct || sp->unsync || sp->role.invalid) return; - slot = gfn_to_memslot(kvm, sp->gfn); - rmapp = &slot->rmap[sp->gfn - slot->base_gfn]; + rmapp = gfn_to_rmap(kvm, sp->gfn, PT_PAGE_TABLE_LEVEL); spte = rmap_next(rmapp, NULL); while (spte) {