WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] How to create shadow page table of my own?

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] How to create shadow page table of my own?
From: 姚福峰 <yffbrave@xxxxxxx>
Date: Mon, 21 Feb 2011 14:53:42 +0800 (CST)
Delivery-date: Sun, 20 Feb 2011 22:55:14 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi, guys
Recently I have been doing some research & I've got in trouble.
I have altered the kernel of domU and put the code section and data section of selinux security server which locate ~/security/selinux/ss into two seperate sections in the final vmlinux image(see below)

objdump -h vmlinux

vmlinux:     file format elf32-i386

Sections:
Idx Name          Size      VMA       LMA       File off  Algn
  0 .text         0048eb08  c0100000  00100000  00001000  2**6
                  CONTENTS, ALLOC, LOAD, RELOC, READONLY, CODE
  1 sim_k_text    0000b7cc  c058f000  0058f000  00490000  2**4
   &nbs p;              CONTENTS, ALLOC, LOAD, RELOC, READONLY, CODE
........................................
 16 .data         000400c8  c0760000  00760000  00661000  2**12
                  CONTENTS, ALLOC, LOAD, RELOC, DATA
 17 sim_k_data    0000007c  c07a1000  007a1000  006a2000  2**5
                  CONTENTS, ALLOC, LOAD, DATA
.....................................

And now I want to create shadow page table of my own for this two sections so that when the kernel use the security server of selinux, it will use my own SPT to access code & data rather than the auto-generated SPT for the kernel.
So, where should I begin to achieve my goal, how can I maintain my SPT in the hypervisor.
Help me through the jungle, please!


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel