[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH 0 of 3] mem_access changes: Trap injection and new memory events for register changes


  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: Joe Epstein <jepstein98@xxxxxxxxx>
  • Date: Sun, 2 Jan 2011 14:13:27 -0800
  • Delivery-date: Sun, 02 Jan 2011 14:15:42 -0800
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:from:date:message-id:subject:to:content-type; b=qwKgqZ1sXWlc7ZVatwboK0tw5WVnA+gj3BqEFFbgc6zguEIgqLGzUl6486udQsTkBU vWZxjGl63TndYEzXXFr3pfDaNXg1UnVzo9ibYsajjgsk4KmMyRtKz7UiESg//BiHcJSh PiZgdr/lsmIvecu9Zj7Xe0Dx6wXnoW3faj1rs=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

Hello,

For those who may be interested in the mem_access patch series I
emailed from Dec 28th, here are a few more changes.  This adds the
ability to register and receive for memory events on CR0, CR3, and CR4
changes (asynchronously or synchronously), as well as the ability to
catch INT3s independently of what the debugger does.  Finally,
software traps can be injected from dom0 for a specific VCPU, through
an HVMOP call.

The patch series, for readability, is based off of the Dec 28th
patches I had sent.  If you want to apply the changes, you should use
the rollup patch that diffs directly from today's repo, attached at
the bottom of this email.

Comments and suggestions are, of course, welcome and appreciated.

Signed-off-by: Joe Epstein <jepstein98@xxxxxxxxx>

Attachment: rollup.patch
Description: Text Data

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.