From: Razvan Cojocaru <rcojocaru@bitdefender.com>
To: "xen-devel@lists.xen.org" <xen-devel@lists.xen.org>
Cc: Ian Jackson <Ian.Jackson@eu.citrix.com>,
kevin.tian@intel.com, keir@xen.org, ian.campbell@citrix.com,
stefano.stabellini@eu.citrix.com, george.dunlap@eu.citrix.com,
andrew.cooper3@citrix.com, eddie.dong@intel.com,
Jan Beulich <JBeulich@suse.com>,
Aravind.Gopalakrishnan@amd.com,
Jun Nakajima <jun.nakajima@intel.com>,
tlengyel@novetta.com, wei.liu2@citrix.com,
boris.ostrovsky@oracle.com, suravee.suthikulpanit@amd.com
Subject: Requesting a freeze exception for vm_event memory introspection helpers
Date: Mon, 13 Jul 2015 10:35:44 +0300 [thread overview]
Message-ID: <55A36A50.1010404@bitdefender.com> (raw)
Hello,
I'd like to ask for a freeze exception for the "vm_event memory
introspection helpers" series.
[PATCH 1/3] xen/mem_access: Support for memory-content hiding
[PATCH 2/3] xen/vm_event: Support for guest-requested events
[PATCH 3/3] xen/vm_event: Deny register writes if refused by
vm_event reply
All patches have been acked by at least one person (though patch 1 is
still under some discussion).
1. Benefits of the series making it in this release:
* Probably the most important benefit is that 4.6 development has been
very open to refactoring vm_events, and patch 3/3 makes vm_events behave
in a consistent manner (all register-write vm_events are pre-write events).
* There are 3rd parties interested in these features (Tamas, for
example, has already expressed interest in uses of patch 1/1).
2. Risks of including the series:
* Since two of the three patches have already received acks from 3+
people, I would assume that the risks for those are minimal. As for the
first patch, unless a vm_event consumer uses the new
VM_EVENT_FLAG_SET_EMUL_READ_DATA vm_event response flag in conjunction
with VM_EVENT_FLAG_EMULATE, the impact should be close to 0 (only a few
"if ( unlikely(set_context_enabled) )" extra statements).
A new series will follow as soon as possible, addressing Jan's comments
on the first patch and cleaning up patch 3 a little more.
Thank you in advance for considering this,
Razvan
next reply other threads:[~2015-07-13 7:35 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-07-13 7:35 Razvan Cojocaru [this message]
2015-07-13 13:51 ` Requesting a freeze exception for vm_event memory introspection helpers Wei Liu
2015-07-13 14:10 ` Razvan Cojocaru
2015-07-13 14:25 ` Wei Liu
2015-07-13 14:42 ` Razvan Cojocaru
2015-07-13 14:56 ` Wei Liu
2015-07-13 14:58 ` Razvan Cojocaru
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=55A36A50.1010404@bitdefender.com \
--to=rcojocaru@bitdefender.com \
--cc=Aravind.Gopalakrishnan@amd.com \
--cc=Ian.Jackson@eu.citrix.com \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=boris.ostrovsky@oracle.com \
--cc=eddie.dong@intel.com \
--cc=george.dunlap@eu.citrix.com \
--cc=ian.campbell@citrix.com \
--cc=jun.nakajima@intel.com \
--cc=keir@xen.org \
--cc=kevin.tian@intel.com \
--cc=stefano.stabellini@eu.citrix.com \
--cc=suravee.suthikulpanit@amd.com \
--cc=tlengyel@novetta.com \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).