Hi, How do you create ring 0 tasks with Fiasco.OC? (I want them to execute rdmsr/wrmsr)
Thanks Daniel
Hi Daniel,
On Tue Apr 09, 2013 at 23:07:47 +0000, Daniel Waddington - SISA wrote:
How do you create ring 0 tasks with Fiasco.OC? (I want them to execute rdmsr/wrmsr)
No such thing there currently. Care to share some more details which kind of MSR access? We were pondering on that as well a couple times already.
Adam
Hi Adam, To set up the performance counters I have to configure the event select MSRs, thus an application or privileged server needs to execute wrmsr. At the moment I have put back in your trap and emulate code (from an earlier version of the kernel) so that the kernel will execute on behalf of the app. Of course this is a major security hole. It would be nice to allow a trusted process access to them.
Best, Daniel
-----Original Message----- From: l4-hackers-bounces@os.inf.tu-dresden.de [mailto:l4-hackers- bounces@os.inf.tu-dresden.de] On Behalf Of Adam Lackorzynski Sent: Wednesday, April 10, 2013 2:53 PM To: l4-hackers@os.inf.tu-dresden.de Subject: Re: Ring 0 task
Hi Daniel,
On Tue Apr 09, 2013 at 23:07:47 +0000, Daniel Waddington - SISA wrote:
How do you create ring 0 tasks with Fiasco.OC? (I want them to execute rdmsr/wrmsr)
No such thing there currently. Care to share some more details which kind of MSR access? We were pondering on that as well a couple times already.
Adam
Adam adam@os.inf.tu-dresden.de Lackorzynski http://os.inf.tu-dresden.de/~adam/
l4-hackers mailing list l4-hackers@os.inf.tu-dresden.de http://os.inf.tu-dresden.de/mailman/listinfo/l4-hackers
On Thu Apr 11, 2013 at 20:51:20 +0000, Daniel Waddington - SISA wrote:
To set up the performance counters I have to configure the event select MSRs, thus an application or privileged server needs to execute wrmsr. At the moment I have put back in your trap and emulate code (from an earlier version of the kernel) so that the kernel will execute on behalf of the app. Of course this is a major security hole. It would be nice to allow a trusted process access to them.
Ack. Thx for letting me know.
Adam
l4-hackers@os.inf.tu-dresden.de