All of lore.kernel.org
 help / color / mirror / Atom feed
* Interfering with memory accesses
@ 2015-07-14 16:24 Bilal Bakht Ahmad
  2015-07-14 16:39 ` Mihai Donțu
  0 siblings, 1 reply; 3+ messages in thread
From: Bilal Bakht Ahmad @ 2015-07-14 16:24 UTC (permalink / raw)
  To: xen-devel


[-- Attachment #1.1: Type: text/plain, Size: 250 bytes --]

Is there anyway to intercept memory accesses from the guest OS in the
hypervisor? Say one wants to detect memory access in a range of addresses
or such. Without hiding pages and page faults because that would induce a
large time penalty.
-- 
bilalba

[-- Attachment #1.2: Type: text/html, Size: 393 bytes --]

[-- Attachment #2: Type: text/plain, Size: 126 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Interfering with memory accesses
  2015-07-14 16:24 Interfering with memory accesses Bilal Bakht Ahmad
@ 2015-07-14 16:39 ` Mihai Donțu
  2015-07-15 21:49   ` Bilal Bakht Ahmad
  0 siblings, 1 reply; 3+ messages in thread
From: Mihai Donțu @ 2015-07-14 16:39 UTC (permalink / raw)
  To: Bilal Bakht Ahmad; +Cc: xen-devel

On Tue, 14 Jul 2015 21:24:04 +0500 Bilal Bakht Ahmad wrote:
> Is there anyway to intercept memory accesses from the guest OS in the
> hypervisor? Say one wants to detect memory access in a range of addresses
> or such. Without hiding pages and page faults because that would induce a
> large time penalty.

Have you looked at http://libvmi.com/ ?

-- 
Mihai Donțu

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: Interfering with memory accesses
  2015-07-14 16:39 ` Mihai Donțu
@ 2015-07-15 21:49   ` Bilal Bakht Ahmad
  0 siblings, 0 replies; 3+ messages in thread
From: Bilal Bakht Ahmad @ 2015-07-15 21:49 UTC (permalink / raw)
  To: Mihai Donțu; +Cc: xen-devel


[-- Attachment #1.1: Type: text/plain, Size: 868 bytes --]

As far as I understand, libvmi only lets us access memory based on virtual
and physical addresses. I want to interfere with a memory access within
Xen, say re translate a certain range of addresses and such.

More so, I'd like to confirm if ANY part of the address translation happens
within the hypervisor, or does it all take place through page tables?

On Tue, Jul 14, 2015 at 9:39 PM, Mihai Donțu <mihai.dontu@gmail.com> wrote:

> On Tue, 14 Jul 2015 21:24:04 +0500 Bilal Bakht Ahmad wrote:
> > Is there anyway to intercept memory accesses from the guest OS in the
> > hypervisor? Say one wants to detect memory access in a range of addresses
> > or such. Without hiding pages and page faults because that would induce a
> > large time penalty.
>
> Have you looked at http://libvmi.com/ ?
>
> --
> Mihai Donțu
>



-- 
Bilal Bakht Ahmad

[-- Attachment #1.2: Type: text/html, Size: 1480 bytes --]

[-- Attachment #2: Type: text/plain, Size: 126 bytes --]

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2015-07-15 21:49 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-07-14 16:24 Interfering with memory accesses Bilal Bakht Ahmad
2015-07-14 16:39 ` Mihai Donțu
2015-07-15 21:49   ` Bilal Bakht Ahmad

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.