|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-devel
[Xen-devel] user mode access to kernel memory
 
Tools like crash want to read /proc/mem to get access to RAM. This isn't
allowed under Xen due to the physical/machine address spaces being
distinct. I wonder, however, why this also isn't permitted through
privcmd (or really, why direct_remap_pfn_range() rejects DOMID_SELF,
but permits the resolved domain ID to be passed).
Thanks, Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 
 |   
 
| <Prev in Thread] | 
Current Thread | 
[Next in Thread> |  
- [Xen-devel] user mode access to kernel memory,
Jan Beulich <=
  
 |  
  
 | 
    | 
  
  
    |   | 
    |