|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] Entry points for updates to shadow PTs
For some CoW purposes, I'm marking all of a the PTEs of ab HVM guest's
current shadow PTs read-only and catching shadow PT induced page
faults to perform the CoW. I've modified the page fault handler in
xen/arch/x86/mm/shadow/multi.c to catch our CoW induced faults as well
as the sh_update_cr3 function to go through and mark all shadow PTEs
read-only for the new set of PTs created on the address space change.
It seems that for some types of page faults, the shadow PTEs are
mucked with and brought back into line with the guest PTEs, which
could revert a read-only shadow PTE back to writable. I can handle
this case in the page fault handler to remark those pages read-only in
the shadow PTE, but I'm afraid there are other places in which the
shadow PTEs are mucked with (e.g. x86 guest PT write emulations) which
could break my read-only requirement.
In which places can shadow PTEs be changed and/or where is the best
place for me to check to see if I must remark them read-only for my
purposes? Maybe in a low level function like "shadow_set_l1e"?
Thanks,
Mike
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] Entry points for updates to shadow PTs,
Mike Sun <=
|
|
|
|
|