[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] xen dire-map area



2012/6/14 Tim Deegan <tim@xxxxxxx>:
> At 17:30 +0800 on 14 Jun (1339695001), Baozeng wrote:
>> Hell all,
>>
>> I am doing some research work on protecting Xen's data structures.
>> I know there is a direct-map area(about 12M), in which we can get  the
>> physical address of the data structure from its virtual address.  My
>> question is : are the stack and the heap of Xen both located in this
>> direct-map area?
>
> On 32-bit x86, anything allocated with alloc_xenheap_* or xmalloc() is
> in that area (and that includes Xen's stacks).  Anything allocated with
> alloc_domheap_* is not.  Also the frametable and M2P are mapped
> separately.  The details are in include/asm-x86/config.h.
>
I see. I want to monitor Xen's data structures in a trusted VM(dom0).
One challenge is how to make dom0 can read Xen's data structure (just
read, do not need to write). Since Xen has more privilege, dom0 cannot
read its data directly.  Can we set up appropriate hypervisor-page
tables for dom0 that map Xen's relevant physical (or virtual) memory
areas? How to do that? Do we need modify Xen's code? or just the
dom0's code?
> Cheers,
>
> Tim.



-- 
     Best Regards,
                                                                 Baozeng Ding
                                                                 OSTG,NFS,ISCAS

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.