[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC V9 4/5] xen, libxc: Request page fault injection via libxc
>> But ultimately, as Tim said, you're basically just *hoping* that it Another approach which may be a bit less complicated then breakpointing the return address is to walk your target process' pagetables when it is scheduled and simply make all pages that don't have the supervisor bit set but are executable to NX in the EPT. That way the kernel code can happily finish and you get a mem-event of user-mode code execution right away without having any false alarms (with the added benefit of this being guest OS agnostic as well). Only downside is if you have multiple vCPUs, then you need to make sure the event was by the target vCPU and do some more housekeeping to step the non-target faulting vCPU over the trap. Tamas _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |