WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] vcpu_info

To: "Jeremy Fitzhardinge" <jeremy@xxxxxxxx>
Subject: Re: [Xen-devel] vcpu_info
From: "pallavi jk" <pallutai@xxxxxxxxx>
Date: Fri, 10 Oct 2008 22:42:19 +0530
Cc: George Dunlap <George.Dunlap@xxxxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Fri, 10 Oct 2008 10:12:47 -0700
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to :subject:cc:in-reply-to:mime-version:content-type:references; bh=8hQICxYK8wQixTTLm8FYsmw7UYfrtOxSW/2Ma/gcaRY=; b=ISvbTDd/dEFPgso7SIQ9WhLwvUlGpj7pggHa3B8UZJ22YTOfPlYkl4vRsArilePcPs cjw66rjuZ2o3cGm/xkhMY1ag585nb0+AMNXShXvx+MNA5bHcQz7+UkOOSFL9Me3b8u47 6dUwrTePneiXCFR7ZJ3WEfcZPsJxHRBCF8TyY=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:cc:in-reply-to:mime-version :content-type:references; b=HJlbvoMEmVZPwWXm6qzqi/dxbCcqvLkcYIoTtAbn6uEoMUZEsqtX7mlzDqi5uW/1AL H19GAth8v1NknOnz0ca15awwycGtF4eB7beb5cgKp2CVlfkyvBdEEIgHYHAqLi8Y//3b 8aeD7dLEOuiBvLsfGxjFQnqmpjBmj8F4S/QIo=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <48EF8579.4040201@xxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <a55a39a90810100537l14197952k4dfef518f6527604@xxxxxxxxxxxxxx> <de76405a0810100545i35523668gc04705ea3c191b3c@xxxxxxxxxxxxxx> <a55a39a90810100600l3d9abe76u7b0bad194fc9f10b@xxxxxxxxxxxxxx> <48EF8579.4040201@xxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi Jeremy,

Yes, I am planning to modify xen and the guest OS as well.

I need to trap every entry into the guest OS from user mode because I need to perform some checks in the hypervisor before transferring control to the guest OS.
So I need to avoid fast handlers which would directly transfer control to the guest OS, as I want to trap this entry first in the hypervisor. I need to do this as I intend to protect applications from a possibly malicious OS, so I want to perform some checks in the hypervisor.

I have just started studying the code. Can you please provide me guidelines about which source files and functions I should concentrate on?

On Fri, Oct 10, 2008 at 10:10 PM, Jeremy Fitzhardinge <jeremy@xxxxxxxx> wrote:
pallavi jk wrote:
Thanx George.

Yes, am looking into xen-2.0. "struct vcpu_info" is not present there.

Actually am doing a project in which i need to provide a functionality similar to pushing the address of cr2 onto the stack.

Also, how can I avoid the use of fast handlers?...I need to perform some checks inside xen before transferring control to the guest OS for each trap.

Should I modify the "set_trap_table" hypercall for that??

It might help if you give a more complete description of what you're trying to achieve.  The list of things you're trying to do or want don't make a lot of sense on their own.

For example, are you modifying Xen?  Or just guest code?  If you're modifying Xen, it's pretty easy to remove the special case for trap 0x80.

  J

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>