|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] user mode access to kernel memory
Tools like crash want to read /proc/mem to get access to RAM. This isn't
allowed under Xen due to the physical/machine address spaces being
distinct. I wonder, however, why this also isn't permitted through
privcmd (or really, why direct_remap_pfn_range() rejects DOMID_SELF,
but permits the resolved domain ID to be passed).
Thanks, Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread> |
- [Xen-devel] user mode access to kernel memory,
Jan Beulich <=
|
|
|
|
|