From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([140.186.70.92]:33970) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1RxkMj-0007io-GQ for qemu-devel@nongnu.org; Wed, 15 Feb 2012 14:18:10 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1RxkMi-0002Gj-Ge for qemu-devel@nongnu.org; Wed, 15 Feb 2012 14:18:09 -0500 Received: from tx2ehsobe004.messaging.microsoft.com ([65.55.88.14]:44101 helo=TX2EHSOBE004.bigfish.com) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1RxkMi-0002GQ-Bu for qemu-devel@nongnu.org; Wed, 15 Feb 2012 14:18:08 -0500 Message-ID: <4F3C04E4.4090708@freescale.com> Date: Wed, 15 Feb 2012 13:17:56 -0600 From: Scott Wood MIME-Version: 1.0 References: <4F2AB552.2070909@redhat.com> <4F2B41D6.8020603@codemonkey.ws> <51470503-DEE0-478D-8D01-020834AF6E8C@suse.de> <4F3117E5.6000105@redhat.com> <4F31241C.70404@redhat.com> <4F313354.4080401@redhat.com> <4B03190C-1B6B-48EC-92C7-C27F6982018A@suse.de> <4F3B9497.4020700@redhat.com> In-Reply-To: Content-Type: text/plain; charset="ISO-8859-1" Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [RFC] Next gen kvm api List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Alexander Graf Cc: KVM list , qemu-devel , kvm-ppc , linux-kernel , Avi Kivity On 02/15/2012 05:57 AM, Alexander Graf wrote: > > On 15.02.2012, at 12:18, Avi Kivity wrote: > >> Well the real reason is we have an extra bit reported by page faults >> that we can control. Can't you set up a hashed pte that is configured >> in a way that it will fault, no matter what type of access the guest >> does, and see it in your page fault handler? > > I might be able to synthesize a PTE that is !readable and might throw > a permission exception instead of a miss exception. I might be able > to synthesize something similar for booke. I don't however get any > indication on why things failed. On booke with ISA 2.06 hypervisor extensions, there's MAS8[VF] that will trigger a DSI that gets sent to the hypervisor even if normal DSIs go directly to the guest. You'll still need to zero out the execute permission bits. For other booke, you could use one of the user bits in MAS3 (along with zeroing out all the permission bits), which you could get to by doing a tlbsx. -Scott