[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Publicity] Stealthy monitoring with Xen altp2m
On 01/04/2016 09:31 PM, Lengyel, Tamas wrote: > While the >> altp2m solution might be simpler for your use-case, perhaps neither is >> intrinsically superior. > > For the usecase of monitoring arbitrary memory accesses and code > execution on multi-vCPU systems it is the only readily available > solution at the moment. Using the emulator in this fashion > unfortunately crashes the guest (that's the case you verified too, we > should probably report that issue on xen-devel). But even if the > emulator worked properly, provided the long list of bugs we have > encountered in emulators in recent years I would not be surprised to > find more issues. So if it can be avoided, it should be. And in this > case it can be quite nicely. Apologies, my laptop's touchpad triggered an unwanted click on "Send" without me having been able to finish the previous email. Last part resumed here. I think the crash case should be brought up on xen-devel too - I had assumed that you're still debugging the hypervisor / emulator on that issue.notwithstanding My experience has been the opposite - a few rogue instructions notwithstanding (which have been succesfully "treated" with the patch linked in the previous email), the emulator has been a workhorse and has triggered no significant issues. I do appreciate that your use case is different. We probably should get at the bottom of what's happening there. Cheers, Razvan _______________________________________________ Publicity mailing list Publicity@xxxxxxxxxxxxxxxxxxxx http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |