[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] [PATCH RFC 5/9] xen: Support for VMCALL mem_events
- To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxx
- From: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
- Date: Wed, 02 Jul 2014 18:59:38 +0300
- Cc: tim@xxxxxxx
- Comment: DomainKeys? See http://domainkeys.sourceforge.net/
- Delivery-date: Wed, 02 Jul 2014 15:59:12 +0000
- Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=bitdefender.com; b=r8oKXkFJonpllHVCPpjrHZoLYveXaTQRqahO4FPBRbYIXMKQ2RjfkAEnD7/mPFS2BxoqX1Girwe3yujkK5Z3u73T4AopRK5R3Yizqsk3ZlzMtmQWTxBaTNlvqwkQL0b/c2NFbzY4a4MZNs8tHXfQDaTATXuz2D6T8U26fncj9p4Q7ZRlaSOA2FRGu+Y/NUl4GRWSoyEJBnCs+iDiVyWN1jeOmAHIPw2TJ//RrKC5tMF3jZba4z+n5+RySF7v+lZQ1DiEKJ0XI6YglgMi2/oBYOmivZ8fr42V+iaMLxcNmoVcUfYPMRDtAsJ4icvA375T0C5owQcJ8hPruYuQsMb0GA==; h=Received:Received:Received:Received:Message-ID:Date:From:User-Agent:MIME-Version:To:CC:Subject:References:In-Reply-To:Content-Type:Content-Transfer-Encoding:X-BitDefender-Scanner:X-BitDefender-Spam:X-BitDefender-SpamStamp:X-BitDefender-CF-Stamp;
- List-id: Xen developer discussion <xen-devel.lists.xen.org>
On 07/02/2014 06:54 PM, Andrew Cooper wrote:
> On 02/07/14 14:33, Razvan Cojocaru wrote:
>> Added support for VMCALL events (the memory introspection library
>> will have the guest trigger VMCALLs, which will then be sent along
>> via the mem_event mechanism).
>>
>> Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
>
> Am I correct in concluding that this is an escape mechanism for
> something inside the guest to trap to the toolstack userspace monitoring
> the guest?
Yes.
Thanks,
Razvan Cojocaru
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|