[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Entry points for updates to shadow PTs
For some CoW purposes, I'm marking all of a the PTEs of ab HVM guest's current shadow PTs read-only and catching shadow PT induced page faults to perform the CoW. I've modified the page fault handler in xen/arch/x86/mm/shadow/multi.c to catch our CoW induced faults as well as the sh_update_cr3 function to go through and mark all shadow PTEs read-only for the new set of PTs created on the address space change. It seems that for some types of page faults, the shadow PTEs are mucked with and brought back into line with the guest PTEs, which could revert a read-only shadow PTE back to writable. I can handle this case in the page fault handler to remark those pages read-only in the shadow PTE, but I'm afraid there are other places in which the shadow PTEs are mucked with (e.g. x86 guest PT write emulations) which could break my read-only requirement. In which places can shadow PTEs be changed and/or where is the best place for me to check to see if I must remark them read-only for my purposes? Maybe in a low level function like "shadow_set_l1e"? Thanks, Mike _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |