From mboxrd@z Thu Jan 1 00:00:00 1970 From: Avi Kivity Subject: Re: [ANNOUNCE] kvm-43 release Date: Mon, 24 Sep 2007 11:51:23 +0200 Message-ID: <46F7889B.70000@qumranet.com> References: <46F358D2.9000009@qumranet.com> <46F3E1E7.7010602@redhat.com> <46F4B800.20408@qumranet.com> <46F786DF.7020600@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Cc: kvm-devel To: Gerd Hoffmann Return-path: In-Reply-To: <46F786DF.7020600-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org Errors-To: kvm-devel-bounces-5NWGOfrQmneRv+LV9MX5uipxlwaOVQ5f@public.gmane.org List-Id: kvm.vger.kernel.org Gerd Hoffmann wrote: > Avi Kivity wrote: > >> You can call kvm_disable_irqchip_creation() to kill in-kernel pic and >> friends. >> >> (the logic is inverted -- the function should be >> kvm_enable_irqchip_creation() so that this problem would not occur) >> > > Ok, will try, next question first though as I'm running in trouble much > earlier in -44: I get suspious page faults. > > I *think* it happens because I'm changing guest page tables from outside > (i.e. host application), and the new intel pgtable optimization bits > don't expect that (yes, it is a vt box). > Well, the older implementation doesn't expect that either. You can disable the optimization with bypass_guest_pf=0, though. > A quick scan of kvmctl.h doesn't show anything which looks like I could > call to tell kvm the guest page tables have been modified. Hints how to > handle this? > > There's a kvm_mmu_zap_all() function, but it isn't exposed. It's very coarse grained, but can be used for experiments. You could write a new ioctl that tells kvm that some pages were modified by the host; that's useful for guests which page out page tables (and so, during page in, disk dma could overwrite a page table). -- error compiling committee.c: too many arguments to function ------------------------------------------------------------------------- This SF.net email is sponsored by: Microsoft Defy all challenges. Microsoft(R) Visual Studio 2005. http://clk.atdmt.com/MRT/go/vse0120000070mrt/direct/01/