diff options
author | Paolo Bonzini <pbonzini@redhat.com> | 2013-09-09 13:52:33 +0200 |
---|---|---|
committer | Gleb Natapov <gleb@redhat.com> | 2013-09-17 12:52:31 +0300 |
commit | ba6a3541545542721ce821d1e7e5ce35752e6fdf (patch) | |
tree | b53ff602454f383dc8148d38d7d870972d7866db /include | |
parent | 3261107ebfd8f6bba57cfcdb89385779fd149a00 (diff) | |
download | linux-ba6a3541545542721ce821d1e7e5ce35752e6fdf.tar.gz linux-ba6a3541545542721ce821d1e7e5ce35752e6fdf.tar.bz2 linux-ba6a3541545542721ce821d1e7e5ce35752e6fdf.zip |
KVM: mmu: allow page tables to be in read-only slots
Page tables in a read-only memory slot will currently cause a triple
fault because the page walker uses gfn_to_hva and it fails on such a slot.
OVMF uses such a page table; however, real hardware seems to be fine with
that as long as the accessed/dirty bits are set. Save whether the slot
is readonly, and later check it when updating the accessed and dirty bits.
Reviewed-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
Reviewed-by: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'include')
-rw-r--r-- | include/linux/kvm_host.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/kvm_host.h b/include/linux/kvm_host.h index ca645a01d37a..0fbbc7aa02cb 100644 --- a/include/linux/kvm_host.h +++ b/include/linux/kvm_host.h @@ -533,6 +533,7 @@ int gfn_to_page_many_atomic(struct kvm *kvm, gfn_t gfn, struct page **pages, struct page *gfn_to_page(struct kvm *kvm, gfn_t gfn); unsigned long gfn_to_hva(struct kvm *kvm, gfn_t gfn); +unsigned long gfn_to_hva_prot(struct kvm *kvm, gfn_t gfn, bool *writable); unsigned long gfn_to_hva_memslot(struct kvm_memory_slot *slot, gfn_t gfn); void kvm_release_page_clean(struct page *page); void kvm_release_page_dirty(struct page *page); |