|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] Sources of page dirtying for HVM domains in Xen 3.2.x
Hi all,
I recently moved my research implementation to Xen 3.2.x from 3.1.x
and am trying to get a grasp on the shadow page table code changes.
I need to trap all writes/modifications to memory pages mapped in a
HVM domain's pseudo-physical address space. I have been using the
log-dirty mode as a means to do this. It seems like for an HVM domain
in log-dirty mode, all writes to guest memory will trigger a page
fault, which can be then handled in sh_page_fault(). The log-dirty
handling code is buried inside _sh_propagate() which is eventually
called from sh_page_fault().
But I've noticed that the paging_mark_dirty() is also called from
other places that do not originate from the page fault handler. This
makes sense to me for PV translated domains as other Xen functions may
modify guest pages. But for HVM domains, are there other sources of
guest memory modification that will not originate from page faults?
Thanks,
Mike
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] Sources of page dirtying for HVM domains in Xen 3.2.x,
Mike Sun <=
|
|
|
|
|