|
|
|
|
|
|
|
|
|
|
xen-devel
[Xen-devel] Xen EPT modifications and interceptions
We are trying to set page guards in EPT entry to intercept the access to certain guest page on 32-bit hvm guest. Though we have briefly investigated into the p2m module and the ept module in xen, we only got an awkward approach that hacks into the EPT.
1. We depend on ept_set_entry to split super page into normal 4K pages first. 2. We employ the similar way that ept_set_entry has done to find an entry. Once found, we modify its access bit (rwx) violently after the p2m_type_t has applied its rules to these bits.
3. We hook the ept_handle_violation to intercept these ept violations that will cause domain crash and find out if these faults are caused by formal modifications in 2 and settle them. Then we come across several problems:
We use map_domain_page to map the ept table that contains the target entry. After changing the access bits in that entry, we use unmap_domain_page to activate the modification. But it seems that when we again map the ept table and fetch the exact entry we've modified just before, our modifications haven't taken effect. Any sometimes the modification will cause interception while in some cases it doesn'. Is there anything to do which our using of map/unmap functions? Or do we need to flush something when we have made the modifications?
-- Kenmark
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- [Xen-devel] Xen EPT modifications and interceptions,
ken mark <=
|
|
|
|
|