Izik Eidus wrote:
> Anthony Liguori wrote:
>   
>> Izik Eidus wrote:
>>     
>>> Anthony Liguori wrote:
>>>       
>>>> I've been playing around with these patches.  If I do an 
>>>> madvise(MADV_DONTNEED) in userspace, when I close the VM, I get the 
>>>> following bug.  My knowledge of the mm is limited but since 
>>>> madvise(MADV_DONTNEED) effectively does a zap_page_range() I wonder 
>>>> if we're lacking the necessary callback to also remove any potential 
>>>> GPA covered by that range from shadow page cache.
>>>>
>>>> Regards,
>>>>
>>>> Anthony Liguori
>>>>         
>>> it probably beacuse the changes of the first patch, ( that make all 
>>> present shadow pages rmapped )
>>> Anthony can you please check what happn if you run latest kvm with 
>>> the patch (of the rmap) and without the patch?
>>>       
>> It looks like it's my patch for doing an in kernel mmap() to support 
>> older userspaces.  I'll figure out what the problem is.
>>
>> But at any rate, would madvise() be able to evict the current contents 
>> of something in the shadow page cache or will the guest not pick up 
>> the new memory until the old gets evicted from the shadow page cache?
>>     
> if i understand you right, then madvise() wont harm us, beacuse we 
> protect all our shadow memory by removing the writable bit from it.
> therefor the guest cant change anything without we know it.
>   

The host userspace can, though, and we need to protect the kernel from that.

-- 
Do not meddle in the internals of kernels, for they are subtle and quick to 
panic.


-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
kvm-devel mailing list
kvm-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/kvm-devel

Reply via email to