[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Publicity] Stealthy monitoring with Xen altp2m


  • To: "Lengyel, Tamas" <tlengyel@xxxxxxxxxxx>
  • From: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
  • Date: Mon, 4 Jan 2016 22:03:28 +0200
  • Cc: publicity@xxxxxxxxxxxxxxxxxxxx
  • Comment: DomainKeys? See http://domainkeys.sourceforge.net/
  • Delivery-date: Mon, 04 Jan 2016 20:03:34 +0000
  • Domainkey-signature: a=rsa-sha1; q=dns; c=nofws; s=default; d=bitdefender.com; b=UHWAiY6PvVO9zKiH8g+sdbTkeUXW0y3F+0YVPL61yGkWscBosKZTOW2NX4WsMgXIcGfVq+KI2xl40MaZOsB2Wyv7OysDjhfB1CqnoSokMg8IUJCJOFJd0oWBXnujivh0aX3gOsZLJllzJIZ8mnUM6UUOP/6QR7YwFHPXg1rqLjzOvn6z4y8OdUvhtbPhzQjN/XGPzOxzIZqcVTNhPq5Fim1exUmoGmtVQ6kXlKPrAGyUTXLPDfLb5GEfAr9M+IKQ1wsnRDkAFkx8ID7F0zL4Z2LgcyzZWH4nP23gZ5puGEYJOjRXLuLtEU1ejTAe3SeHsdwuFC6yxw1rBFrWs3jGOw==; h=Received:Received:Received:Received:Received:Subject:To:References:Cc:From:Message-ID:Date:User-Agent:MIME-Version:In-Reply-To:Content-Type:Content-Transfer-Encoding:X-BitDefender-Scanner:X-BitDefender-Spam:X-BitDefender-SpamStamp:X-BitDefender-CF-Stamp;
  • List-id: "List for Xen Publicity, PR and events" <publicity.lists.xenproject.org>

On 01/04/2016 09:31 PM, Lengyel, Tamas wrote:
> While the
>> altp2m solution might be simpler for your use-case, perhaps neither is
>> intrinsically superior.
> 
> For the usecase of monitoring arbitrary memory accesses and code
> execution on multi-vCPU systems it is the only readily available
> solution at the moment.  Using the emulator in this fashion
> unfortunately crashes the guest (that's the case you verified too, we
> should probably report that issue on xen-devel). But even if the
> emulator worked properly, provided the long list of bugs we have
> encountered in emulators in recent years I would not be surprised to
> find more issues. So if it can be avoided, it should be. And in this
> case it can be quite nicely.

Apologies, my laptop's touchpad triggered an unwanted click on "Send"
without me having been able to finish the previous email. Last part
resumed here.

I think the crash case should be brought up on xen-devel too - I had
assumed that you're still debugging the hypervisor / emulator on that
issue.notwithstanding

My experience has been the opposite - a few rogue instructions
notwithstanding (which have been succesfully "treated" with the patch
linked in the previous email), the emulator has been a workhorse and has
triggered no significant issues.

I do appreciate that your use case is different. We probably should get
at the bottom of what's happening there.


Cheers,
Razvan

_______________________________________________
Publicity mailing list
Publicity@xxxxxxxxxxxxxxxxxxxx
http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.