[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH V2 4/5] xen, libxc: Request page fault injection via libxc
On Wed, 2014-09-03 at 14:20 +0300, Razvan Cojocaru wrote: > Extended HVMOP_inject_trap to allow asking for trap injection done > by the first available CPU, when it's in user mode and its CR3 > matches the one for an interesting application inside the guest. > This mechanism allows bringing in swapped-out pages for inspection. > > Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> > --- > tools/libxc/xc_misc.c | 5 ++- > tools/libxc/xenctrl.h | 3 +- > tools/tests/xen-access/xen-access.c | 2 +- Assuming they hypervisor maintainers are OK with the underlying hypercall interface the toolstack bits are: Acked-by: Ian Campbell <ian.campbell@xxxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |