From mboxrd@z Thu Jan 1 00:00:00 1970 From: Razvan Cojocaru Subject: [PATCH RFC V2 0/6] Basic guest memory introspection support Date: Fri, 11 Jul 2014 18:44:21 +0300 Message-ID: <53C00655.7030106@bitdefender.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: "xen-devel@lists.xen.org" Cc: Andrew Cooper , mdontu , Tim Deegan , Jan Beulich List-Id: xen-devel@lists.xenproject.org Hello, First of all, thank you all for your reviews! Based on what we've discussed, a new series follows. Changes since V1: - Removed, for the time being, the Linux-borrowed code for computing instruction length. - Removed the code that attempted to get around emulator limitations by setting the 'accessed' and 'dirty' bits and re-executing problematic instructions. - Skipped the "[PATCH RFC 9/9] mm: mark pages that have their permissions controlled by a domain" patch, hopefully this has been fixed in Xen 4.5. - Took out the trivial C++ patch (previously "[PATCH RFC 4/9] xenctrl: Make the headers C++ friendly"), also posted separately and hopefully scheduled for inclusion soon. - Removed code redundancy. - Addressed discussed issues (in the code itself, and patch descriptions - please see individual patches for details). Patches: xen: Handle resumed instruction based on previous mem_event reply xen, libxc: Request page fault injection via libxc xen: Support for VMCALL mem_events xen: Force-enable relevant MSR events; optimize the number of sent MSR events xen: Optimize introspection access to guest state xen: Emulate with no writes Thanks, Razvan Cojocaru