|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] [PATCH 0 of 3] mem_access changes: Trap injection and new me
Hello,
For those who may be interested in the mem_access patch series I
emailed from Dec 28th, here are a few more changes. This adds the
ability to register and receive for memory events on CR0, CR3, and CR4
changes (asynchronously or synchronously), as well as the ability to
catch INT3s independently of what the debugger does. Finally,
software traps can be injected from dom0 for a specific VCPU, through
an HVMOP call.
The patch series, for readability, is based off of the Dec 28th
patches I had sent. If you want to apply the changes, you should use
the rollup patch that diffs directly from today's repo, attached at
the bottom of this email.
Comments and suggestions are, of course, welcome and appreciated.
Signed-off-by: Joe Epstein <jepstein98@xxxxxxxxx>
rollup.patch
Description: Text Data
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-devel] [PATCH 0 of 3] mem_access changes: Trap injection and new memory events for register changes,
Joe Epstein <=
|
Previous by Date: |
[Xen-devel] [PATCH 2 of 5] FIX: mem_access: p2m and ept function changes to propagate access, Joe Epstein |
Next by Date: |
[Xen-devel] [PATCH 1 of 3] mem_access changes: trap injection, INT3 and CR0, 3, 4 mem events, Joe Epstein |
Previous by Thread: |
[Xen-devel] [PATCH 2 of 5] FIX: mem_access: p2m and ept function changes to propagate access, Joe Epstein |
Next by Thread: |
[Xen-devel] [PATCH 1 of 3] mem_access changes: trap injection, INT3 and CR0, 3, 4 mem events, Joe Epstein |
Indexes: |
[Date]
[Thread]
[Top]
[All Lists] |
|
|
|
|