[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH RFC V7 4/5] xen, libxc: Request page fault injection via libxc


  • To: Jan Beulich <JBeulich@xxxxxxxx>
  • From: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  • Date: Tue, 26 Aug 2014 17:24:45 +0300
  • Cc: kevin.tian@xxxxxxxxx, ian.campbell@xxxxxxxxxx, stefano.stabellini@xxxxxxxxxxxxx, andrew.cooper3@xxxxxxxxxx, eddie.dong@xxxxxxxxx, xen-devel@xxxxxxxxxxxxx, jun.nakajima@xxxxxxxxx, ian.jackson@xxxxxxxxxxxxx
  • Comment: DomainKeys? See http://domainkeys.sourceforge.net/
  • Delivery-date: Tue, 26 Aug 2014 14:24:30 +0000
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=bitdefender.com; b=Q0UHM8QzM/RhDDojhJDZ5p5cvudjPjBJ+kaijWenStNkbIWNMPQeTvu9Bankg9JAei3fwPv6HKaMxMOyyvrEw18u7cxG+6JNLmNkv0r7gXWQUgw1Ya9LIE3yVJgp8eoLq0i8qH4oxNjG5bDXiVPUNVU1F+zvoZ3Y5jLhVP6N7pK+QysN9ublzDJA12g8nb9Y5Q2yvzrEvxVE22Fwxdlg22ZKK8gg7SQ6tpShkCUendXIZANG/CJY0eQcxYMCOsB+8gaZbtn6PN2840vsGpxogPt7VfIZmyhHnbKGrxPeqsAZ7WucKYPKBYe1BQh8kIScIR1P8uPMNQotHDzLTXYtpA==; h=Received:Received:Received:Received:Message-ID:Date:From:User-Agent:MIME-Version:To:CC:Subject:References:In-Reply-To:Content-Type:Content-Transfer-Encoding:X-BitDefender-Scanner:X-BitDefender-Spam:X-BitDefender-SpamStamp:X-BitDefender-CF-Stamp;
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>

On 08/26/2014 05:13 PM, Jan Beulich wrote:
>>>> On 13.08.14 at 17:28, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
>> --- a/xen/include/asm-x86/hvm/domain.h
>> +++ b/xen/include/asm-x86/hvm/domain.h
>> @@ -141,6 +141,14 @@ struct hvm_domain {
>>       */
>>      uint64_t sync_tsc;
>>  
>> +    /* Memory introspection page fault injection data. */
>> +    struct {
>> +        uint64_t address_space;
>> +        uint64_t virtual_address;
>> +        uint32_t errcode;
>> +        bool_t valid;
>> +    } fault_info;
> 
> Sorry for noticing this only now, but how can this be a per-domain
> thing rather than a per-vCPU one?

The requirement for our introspection application has simply been to
bring back in a swapped-out page, regardless of what VCPU ends up
actually doing it.


Thanks,
Razvan Cojocaru

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.