From mboxrd@z Thu Jan 1 00:00:00 1970 From: mtosatti@redhat.com Subject: [patch 4/5] KVM: MMU: reload request from GET_DIRTY_LOG path Date: Wed, 18 Jun 2014 20:12:07 -0300 Message-ID: <20140618231521.718959400@amt.cnet> References: <20140618231203.846608908@amt.cnet> Cc: pbonzini@redhat.com, xiaoguangrong@linux.vnet.ibm.com, gleb@kernel.org, avi@cloudius-systems.com, Marcelo Tosatti To: kvm@vger.kernel.org, ak@linux.intel.com Return-path: Received: from mx1.redhat.com ([209.132.183.28]:54630 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751569AbaFRXRC (ORCPT ); Wed, 18 Jun 2014 19:17:02 -0400 Content-Disposition: inline; filename=mmu-get-dirty-log-pinned Sender: kvm-owner@vger.kernel.org List-ID: Reload remote vcpus MMU from GET_DIRTY_LOG codepath, before deleting a pinned spte. Signed-off-by: Marcelo Tosatti --- arch/x86/kvm/mmu.c | 3 +++ 1 file changed, 3 insertions(+) Index: kvm.pinned-sptes/arch/x86/kvm/mmu.c =================================================================== --- kvm.pinned-sptes.orig/arch/x86/kvm/mmu.c 2014-06-13 16:50:50.040140594 -0300 +++ kvm.pinned-sptes/arch/x86/kvm/mmu.c 2014-06-13 16:51:05.620104451 -0300 @@ -1247,6 +1247,9 @@ spte &= ~SPTE_MMU_WRITEABLE; spte = spte & ~PT_WRITABLE_MASK; + if (is_pinned_spte(spte)) + mmu_reload_pinned_vcpus(kvm); + return mmu_spte_update(sptep, spte); }