xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
* Possible to prevent dom0 accessing guest memory?
@ 2016-11-14 14:51 Andy Smith
  2016-11-14 15:06 ` Andrew Cooper
  0 siblings, 1 reply; 5+ messages in thread
From: Andy Smith @ 2016-11-14 14:51 UTC (permalink / raw)
  To: xen-devel

Hello,

Please forgive me if this is a naive question but I do not know this
low-level stuff very well.

If the ability of the toolstack to dump a guest's memory (e.g. xl
dump-core) were disabled on the hypervisor side, would there be any
other way to do so from dom0 without rebooting the machine into a
hypervisor that had the capability re-enabled?

I understand dom0 has privileges to map devices to guests; does that
give it a way to read arbitrary memory without need of toolstack
support?

The purpose of my question is in seeing if disk encryption in VMs
can be made slightly more useful. If there were no way for root in
dom0 to read guest memory without rebooting into a different
hypervisor then I think that would be a useful step.

Cheers,
Andy

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2016-11-14 20:35 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2016-11-14 14:51 Possible to prevent dom0 accessing guest memory? Andy Smith
2016-11-14 15:06 ` Andrew Cooper
2016-11-14 15:29   ` Andy Smith
2016-11-14 17:09     ` George Dunlap
2016-11-14 20:35       ` Andy Smith

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).