* [PATCH RFC V2 0/6] Basic guest memory introspection support
@ 2014-07-11 15:44 Razvan Cojocaru
0 siblings, 0 replies; only message in thread
From: Razvan Cojocaru @ 2014-07-11 15:44 UTC (permalink / raw
To: xen-devel@lists.xen.org; +Cc: Andrew Cooper, mdontu, Tim Deegan, Jan Beulich
Hello,
First of all, thank you all for your reviews! Based on what we've
discussed, a new series follows.
Changes since V1:
- Removed, for the time being, the Linux-borrowed code for
computing instruction length.
- Removed the code that attempted to get around emulator limitations
by setting the 'accessed' and 'dirty' bits and re-executing
problematic instructions.
- Skipped the "[PATCH RFC 9/9] mm: mark pages that have their
permissions controlled by a domain" patch, hopefully this has
been fixed in Xen 4.5.
- Took out the trivial C++ patch (previously "[PATCH RFC 4/9]
xenctrl: Make the headers C++ friendly"), also posted
separately and hopefully scheduled for inclusion soon.
- Removed code redundancy.
- Addressed discussed issues (in the code itself, and patch
descriptions - please see individual patches for details).
Patches:
xen: Handle resumed instruction based on previous mem_event reply
xen, libxc: Request page fault injection via libxc
xen: Support for VMCALL mem_events
xen: Force-enable relevant MSR events; optimize the number of sent MSR
events
xen: Optimize introspection access to guest state
xen: Emulate with no writes
Thanks,
Razvan Cojocaru
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2014-07-11 15:44 UTC | newest]
Thread overview: (only message) (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-07-11 15:44 [PATCH RFC V2 0/6] Basic guest memory introspection support Razvan Cojocaru
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.