[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC V3 4/5] xen, libxc: Request page fault injection via libxc
Since the majority of the domains will never use it, even a tiny overhead adds up, especially over time. It would be a lot cleaner to trap the execution of the VM at the moment when it is safe to inject the page fault instead. For example you could just mark the process' code pages non-executable in the EPT, catch the violations, and if the conditions are met inject your pagefault.
I don't think having just the VCPU paused is enough, another still active VCPU might still swap the page back, so you would really need to have the entire VM paused for this to be safe. Furthermore, if there are any limitations/assumptions like this about the intended use of the function, describing them in a comment in xenctrl.h would be appropriate. Cheers! Tamas _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |