WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] HVM Debugging (Injecting INT3)

To: <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: [Xen-devel] HVM Debugging (Injecting INT3)
From: "Guy Zana" <guy@xxxxxxxxxxxx>
Date: Thu, 8 Nov 2007 09:51:20 -0500
Delivery-date: Thu, 08 Nov 2007 06:53:18 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcgiFgNQy/edoHpCQXKbiAXTF++roQ==
Thread-topic: HVM Debugging (Injecting INT3)
I am debugging a driver inside a HVM and I'll want to trigger a debug break from the device model if the guest access a specific PCI config address.
I thought about creating a hypercall that injects TRAP_int3 using vmx_inject_hw_exception()/svm_inject_exception().
 
If I'll place the correct hook in ioemu, is it simple as creating a hypercall that calls vmx_inject_hw_exception() in order to break on the actual instruction that performs the PCI config access?
 
Thanks,
Guy.
 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] HVM Debugging (Injecting INT3), Guy Zana <=