|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-devel
Re: [Xen-devel] Academic Project
 
On Wed, Mar 04, 2009 at 08:25:49AM +0530, dinesh chandrasekaran wrote:
Hi dinesh
>    > That implies the protection hardware is not controlled by the dom0 and
>    > there is another more secure way for the administration of it and second
>    > that the dom0 can't do anything.
> 
>    Absolutely. You are correct.
Ok, so how do you plan to do this and why is this supposed to be more
secure?
>    I guess the domain scheduling is done by the VMM and not by dom0?
>    Through VMM Hooks, the VMM is made to inform the device about the domain
>    scheduled to run.
>    So dom0 cannot claim to be any domU.
I'm not really sure, but i think the dom0 can access the complete system
memory. If not, then it controls at least some hardware that can do DMA
and can this way access all the memory.
-> dom0 can write/read all memory -> it can do anything
>    > furthermore the dom0 should also be able to overwrite the xen kernel.
> 
>    Can you throw some lights on the above "overwriting the xen kernel by
>    dom0"?
A compromised dom0 could just replace the xen kernel/hypervisor on disk and/or 
in
memory.
Your idea just has so many problems, like what are you doing to do about disk 
i/o?
Christian
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 
 |   
 
 | 
    | 
  
  
    |   | 
    |