On 08/26/2011 12:24 PM, Roedel, Joerg wrote:
>
>  As I see it there are two options: (a) make subsequent accesses from
>  userspace or the guest result in either a SIGBUS that userspace must
>  either deal with or die, or (b) replace the mapping with a dummy RO
>  mapping containing 0xff, with any trapped writes emulated as nops.

The biggest problem with this approach is that it has to happen in the
context of the given process. Linux can't really modify an mm which
which belong to another context in a safe way.


Is use_mm() insufficient?

--
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to