Handy feature, thanks for doing it!

@@ -1466,6 +1466,10 @@ void p2m_mem_access_emulate_check(struct vcpu *v,
>          }
>
>          v->arch.vm_event.emulate_flags = violation ? rsp->flags : 0;
> +
> +        if ( rsp->flags & MEM_ACCESS_SET_EMUL_READ_DATA &&
>

So one of the use-cases for this feature I would have is using it in the
vm_event response to the software breakpoint event. A little bit of
context: I have written 0xCC into target memory locations, which are
further protected by mem_access R/W. This setup right now would suffice to
hide the content easily from the R mem_access events without having to
remove it. But for X tracing I'm not using mem_access events. Here this
feature is locked to be only in response to a mem_access events. I can
*technically* work around that by changing the response type to the
mem_access event, but it would be nice if this feature would be clearly
available for non-mem_access events as well (or at least for software
breakpoint). What do you think, does that usecase make sense here?

Tamas
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to