[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH RFC 5/9] xen: Support for VMCALL mem_events


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxx
  • From: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  • Date: Wed, 02 Jul 2014 18:59:38 +0300
  • Cc: tim@xxxxxxx
  • Comment: DomainKeys? See http://domainkeys.sourceforge.net/
  • Delivery-date: Wed, 02 Jul 2014 15:59:12 +0000
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=bitdefender.com; b=r8oKXkFJonpllHVCPpjrHZoLYveXaTQRqahO4FPBRbYIXMKQ2RjfkAEnD7/mPFS2BxoqX1Girwe3yujkK5Z3u73T4AopRK5R3Yizqsk3ZlzMtmQWTxBaTNlvqwkQL0b/c2NFbzY4a4MZNs8tHXfQDaTATXuz2D6T8U26fncj9p4Q7ZRlaSOA2FRGu+Y/NUl4GRWSoyEJBnCs+iDiVyWN1jeOmAHIPw2TJ//RrKC5tMF3jZba4z+n5+RySF7v+lZQ1DiEKJ0XI6YglgMi2/oBYOmivZ8fr42V+iaMLxcNmoVcUfYPMRDtAsJ4icvA375T0C5owQcJ8hPruYuQsMb0GA==; h=Received:Received:Received:Received:Message-ID:Date:From:User-Agent:MIME-Version:To:CC:Subject:References:In-Reply-To:Content-Type:Content-Transfer-Encoding:X-BitDefender-Scanner:X-BitDefender-Spam:X-BitDefender-SpamStamp:X-BitDefender-CF-Stamp;
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>

On 07/02/2014 06:54 PM, Andrew Cooper wrote:
> On 02/07/14 14:33, Razvan Cojocaru wrote:
>> Added support for VMCALL events (the memory introspection library
>> will have the guest trigger VMCALLs, which will then be sent along
>> via the mem_event mechanism).
>>
>> Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
> 
> Am I correct in concluding that this is an escape mechanism for
> something inside the guest to trap to the toolstack userspace monitoring
> the guest?

Yes.


Thanks,
Razvan Cojocaru


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.