Hi, Is there an escape mechanism that would allow a guest kernel in dom0 to directly access the memory space of the VMM without having to go through the hypercalls? I want to be able to mess with physical pages from within dom0 and perhaps with some vmm data structures from outside of the vmm. I know this breaks strict layering and isolation properties but it would be useful for a tool i''m trying to build. Thanks, Mike _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
On 20/9/06 00:11, "Michael Le" <mvle@CS.UCLA.EDU> wrote:> Is there an escape mechanism that would allow a guest kernel in dom0 to > directly access the memory space of the VMM without having to go through > the hypercalls? I want to be able to mess with physical pages from within > dom0 and perhaps with some vmm data structures from outside of the vmm. > > I know this breaks strict layering and isolation properties but it would > be useful for a tool i''m trying to build.You can call share_xen_page_with_guest() from within Xen to share specific pages of memory with a particular guest. -- Keir _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel