[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH V10 for-4.5 0/4] Basic guest memory introspection support
On 09/18/2014 02:08 PM, Tim Deegan wrote: > At 11:24 +0300 on 18 Sep (1411035862), Razvan Cojocaru wrote: >> We need to be able to detect rootkits in HVM guests, in a way that >> allows an application that runs in dom0 (or a similarly privileged >> domain) to control what the guest is allowed to do once a threat is >> detected. This has been done over the mem_event mechanism. >> >> Here is a summary of the series: >> >> a 1/4 xen: Emulate with no writes >> a 2/4 xen: Optimize introspection access to guest state >> A 3/4 xen, libxc: Force-enable relevant MSR events >> - 4/4 xen: Handle resumed instruction based on previous mem_event reply > > For the x86/mm and mem_event parts, > > Acked-by: Tim Deegan <tim@xxxxxxx> Thanks! Regards, Razvan Cojocaru _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |