|   | 
      | 
  
  
      | 
      | 
  
 
     | 
    | 
  
  
     | 
    | 
  
  
    |   | 
      | 
  
  
    | 
         
xen-devel
[Xen-devel] Prevent guest OSes from accessing paricular memory	locations
 
Hi all, 
  
This is my first post on the list so please
bare with me! 
  
I would like to use Xen hypervisor for
running a Linux guest but I want to prohibit Linux from accessing (i.e. writing
to) some physical memory locations in which registers of some x86
peripherals are located in. For instance, I would like to prevent Linux (not
only the Linux kernel code but anyone who tries to access these I/O ports and
memory mapped registers by e.g. writing a kernel module, etc.) from accessing I/O
ports 3F8h – 3FFh (serial port 1) and HPET memory mapped registers at 0xFED00000
- 0xFED003FF. 
  
Is it possible Xen to redirect these accesses to a printf displaying
for instance a message saying “The access to this memory location is not
allowed” or just ignore them? 
  
Please have a look at http://img209.imageshack.us/img209/4431/linuxmoduleaccessesproh.gif
for a graphical overview of what I want to achieve. 
  
Any help will be much appreciated. 
  
Kind Regards, 
  
Ioannis. 
  
 
 |  
 _______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
 
 |   
 
| <Prev in Thread] | 
Current Thread | 
[Next in Thread>
 |  
- [Xen-devel] Prevent guest OSes from accessing paricular memory	locations,
limp <=
 
 
 |  
  
 | 
    | 
  
  
    |   | 
    |