[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH RFC V2 0/6] Basic guest memory introspection support


  • To: "xen-devel@xxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxx>
  • From: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  • Date: Fri, 11 Jul 2014 18:44:21 +0300
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, mdontu <mdontu@xxxxxxxxxxxxxxx>, Tim Deegan <tim@xxxxxxx>, Jan Beulich <JBeulich@xxxxxxxx>
  • Comment: DomainKeys? See http://domainkeys.sourceforge.net/
  • Delivery-date: Fri, 11 Jul 2014 15:43:30 +0000
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=bitdefender.com; b=zbyYy375wlH7ezlYe0LYfKUzu/MT8WP71a76D2ZZ/ZhodeqWK9Fgf8mUgiEzZqrboLOuFcSZzabCXzvQCvABeXu2DC6AMMByBLyv3YhvyYnmPar3GsB+WsKTJ2wUnY55h9tu1yJQklHmPF+uLxBoiNdXmRRsYU48+Kai7t0Lmpr4Kjzk9Ls6QdcUrvhWJXc+zPIPfbAk+Df/DFP2ePcSRp2qEq6NXtRW3t/bsK/ayZG0nhO0aFaPb8pqoKpGgQsymDEzYGRpc6UEE5Jfe4NEiS4fkivgFyv8gxZQt08Idj+mZOqi3DMmD0vqjU4ptsuYebYI4iUjqM6tnzuxXclB8w==; h=Received:Received:Received:Received:Message-ID:Date:From:User-Agent:MIME-Version:To:CC:Subject:Content-Type:Content-Transfer-Encoding:X-BitDefender-Scanner:X-BitDefender-Spam:X-BitDefender-SpamStamp:X-BitDefender-CF-Stamp;
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>

Hello,

First of all, thank you all for your reviews! Based on what we've
discussed, a new series follows.

Changes since V1:
 - Removed, for the time being, the Linux-borrowed code for
   computing instruction length.
 - Removed the code that attempted to get around emulator limitations
   by setting the 'accessed' and 'dirty' bits and re-executing
   problematic instructions.
 - Skipped the "[PATCH RFC 9/9] mm: mark pages that have their
   permissions controlled by a domain" patch, hopefully this has
   been fixed in Xen 4.5.
 - Took out the trivial C++ patch (previously "[PATCH RFC 4/9]
   xenctrl: Make the headers C++ friendly"), also posted
   separately and hopefully scheduled for inclusion soon.
 - Removed code redundancy.
 - Addressed discussed issues (in the code itself, and patch
   descriptions - please see individual patches for details).

Patches:

xen: Handle resumed instruction based on previous mem_event reply
xen, libxc: Request page fault injection via libxc
xen: Support for VMCALL mem_events
xen: Force-enable relevant MSR events; optimize the number of sent MSR
events
xen: Optimize introspection access to guest state
xen: Emulate with no writes


Thanks,
Razvan Cojocaru

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.