From mboxrd@z Thu Jan 1 00:00:00 1970 From: Razvan Cojocaru Subject: Re: [PATCH v2 00/12] Alternate p2m: support multiple copies of host p2m Date: Wed, 24 Jun 2015 08:39:35 +0300 Message-ID: <558A4297.9090806@bitdefender.com> References: <1434999372-3688-1-git-send-email-edmund.h.white@intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: "Lengyel, Tamas" , Ed White Cc: Ravi Sahita , Wei Liu , Tim Deegan , Ian Jackson , Xen-devel , Jan Beulich , Andrew Cooper , Daniel De Graaf List-Id: xen-devel@lists.xenproject.org On 06/24/2015 12:27 AM, Lengyel, Tamas wrote: > I've extended xen-access to exercise this new feature taking into > account some of the current limitations. Using the altp2m_write|exec > options we create a duplicate view of the default hostp2m, and instead > of relaxing the mem_access permissions when we encounter a violation, we > swap the view on the violating vCPU while also enabling MTF > singlestepping. When the singlestep event fires, we use the response to > that event to swap the view back to the restricted altp2m view. That's certainly very interesting. I wonder what the benefits are in this case over emulating the fault-causing instruction (other than obviously not going through the emulator)? The altp2m method would certainly be slower, since you need more round-trips from userspace to the hypervisor (the EPT vm_event handling + the singlestep event, whereas with emulation you just reply to the original vm_event). Regards, Razvan