[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Sources of page dirtying for HVM domains in Xen 3.2.x
Hi all, I recently moved my research implementation to Xen 3.2.x from 3.1.x and am trying to get a grasp on the shadow page table code changes. I need to trap all writes/modifications to memory pages mapped in a HVM domain's pseudo-physical address space. I have been using the log-dirty mode as a means to do this. It seems like for an HVM domain in log-dirty mode, all writes to guest memory will trigger a page fault, which can be then handled in sh_page_fault(). The log-dirty handling code is buried inside _sh_propagate() which is eventually called from sh_page_fault(). But I've noticed that the paging_mark_dirty() is also called from other places that do not originate from the page fault handler. This makes sense to me for PV translated domains as other Xen functions may modify guest pages. But for HVM domains, are there other sources of guest memory modification that will not originate from page faults? Thanks, Mike _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |