On Mon, Jun 28, 2021 at 4:27 AM stsp <stsp2@xxxxxxxxx> wrote: > > 28.06.2021 13:56, Vitaly Kuznetsov пишет: > > stsp <stsp2@xxxxxxxxx> writes: > > > >> Yes, cancel_injection is supposed to > >> be always broken indeed. But there > >> are a few more things to it. > >> Namely: > >> - Other CPUs do not seem to exhibit > >> that path. My guess here is that they > >> just handle the exception in hardware, > >> without returning to KVM for that. I > >> am not sure why Core2 vmexits per > >> each page fault. Is it incapable of > >> handling the PF in hardware, or maybe > >> some other bug is around? > > Wild guess: no EPT support and running on shadow pages? > > That's something you should tell > me, and not the other way around. :) > I am just working with kvm as a user. > Yes, with shadow paging, kvm intercepts all guest page faults. You should be able to replicate this behavior on modern CPUs by adding "ept=N" to the kvm_intel module parameters.