This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


[Xen-devel] [PATCH 0 of 6] REDO: mem_access & mem_access 2: memory acces

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] [PATCH 0 of 6] REDO: mem_access & mem_access 2: memory access permissions
From: Joe Epstein <jepstein98@xxxxxxxxx>
Date: Tue, 4 Jan 2011 14:07:04 -0800
Delivery-date: Tue, 04 Jan 2011 14:08:30 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:mime-version:received:from:date :message-id:subject:to:content-type; bh=Cdk3YgLIRv9QrTJLaSXIc3AMjGJ5s0ObNJWpXGhyplc=; b=dzgHxfZnIvFtMN5qNriJF4cxlMdKbh4WX1dWBWAXnTJ7GCvKOy8XbGEkGWyITW2eu0 dfWuyZb9hnGlsM1xVC7Ur+snY5IGLNyyt1LtiXK9LIMND748RKt8Nsvl54++0nUCjE6R RzspNAau7zcy88RyaGFM5YCIlOada8/2WX8pI=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:from:date:message-id:subject:to:content-type; b=r92S4o9BvBblkrkQHtJO+jx9zolmju7et6MsycVIWNDdhcvdYgF50ujbMvfhfZkedd cP9F+ufE+szelF31iIkklgyyhj3Sqva7vwTHLdoey6jULB3TPNIFxWevjLP5A4t+bfWb KySbz2y8cl6VjREHJH4uU6oU6RSl/iW6q2AHM=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Apologies everyone for resending, but as requested, here is the
entirety of the mem_access (both original and addition 2), sorted into
patches that independently compile and proceed sequentially as
features are added.  I hope everyone finds the patches more readable.
Please make sure you apply the patches sequentially in the order
given.  Or, you may want to simply apply the one rollup patch attached
to this email.

The purpose of mem_access is to add memory access privileges to pages
that can be set and handled from dom0.  These privileges are somewhat
orthogonal to the existing page types mechanism, as page types have to
handle MMIO, demand paging, and page sharing, whereas the access flags
are pure permission checks.  There are a couple of HVMOPs added to
support this from dom0, as well as the necessary changes to libxc.
This is designed to be a generic interface, and a dom0 memory event
listener has broad abilities to set and handle permissions.

The feature is currently only implemented for HVM using EPTs on VMX,
though it can be added elsewhere in essentially the same manner.

This patch series (either the rollup here or the associated patches
1-6) supercedes all previous patches for mem_access and mem_access 2,
sent from late December until now.

If you find it useful, please let me know.  And as always, comments,
questions, and critiques are always welcome.


Signed-off-by: Joe Epstein <jepstein@xxxxxxxxx>

Attachment: rollup.patch
Description: Binary data

Xen-devel mailing list
<Prev in Thread] Current Thread [Next in Thread>