WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] [PATCH 0 of 3] mem_access changes: Trap injection and new me

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] [PATCH 0 of 3] mem_access changes: Trap injection and new memory events for register changes
From: Joe Epstein <jepstein98@xxxxxxxxx>
Date: Sun, 2 Jan 2011 14:13:27 -0800
Delivery-date: Sun, 02 Jan 2011 14:15:42 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:mime-version:received:from:date :message-id:subject:to:content-type; bh=/vpAtduvh4PAeL8vCubukMqHGnrqWZHflQnaloLdgJk=; b=qTEighDxVjxUe81MxzgqMlHmcdkfrKzb7NR8VCgWGzFdNyzUdiE5HVlE1zmyaP4eH4 Gu25h0wZc4y3xWrLqjDxJh2pOzXfwrCpoaWzkjkBG5w+FAjoUdEf/8+DO7maKp15vBVQ XlbF9+PFjcOleGC62e95uCnwZ0nPLMM3mYhDA=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:from:date:message-id:subject:to:content-type; b=qwKgqZ1sXWlc7ZVatwboK0tw5WVnA+gj3BqEFFbgc6zguEIgqLGzUl6486udQsTkBU vWZxjGl63TndYEzXXFr3pfDaNXg1UnVzo9ibYsajjgsk4KmMyRtKz7UiESg//BiHcJSh PiZgdr/lsmIvecu9Zj7Xe0Dx6wXnoW3faj1rs=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hello,

For those who may be interested in the mem_access patch series I
emailed from Dec 28th, here are a few more changes.  This adds the
ability to register and receive for memory events on CR0, CR3, and CR4
changes (asynchronously or synchronously), as well as the ability to
catch INT3s independently of what the debugger does.  Finally,
software traps can be injected from dom0 for a specific VCPU, through
an HVMOP call.

The patch series, for readability, is based off of the Dec 28th
patches I had sent.  If you want to apply the changes, you should use
the rollup patch that diffs directly from today's repo, attached at
the bottom of this email.

Comments and suggestions are, of course, welcome and appreciated.

Signed-off-by: Joe Epstein <jepstein98@xxxxxxxxx>

Attachment: rollup.patch
Description: Text Data

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] [PATCH 0 of 3] mem_access changes: Trap injection and new memory events for register changes, Joe Epstein <=