[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH V10 for-4.5 0/4] Basic guest memory introspection support



On 09/18/2014 02:08 PM, Tim Deegan wrote:
> At 11:24 +0300 on 18 Sep (1411035862), Razvan Cojocaru wrote:
>> We need to be able to detect rootkits in HVM guests, in a way that
>> allows an application that runs in dom0 (or a similarly privileged
>> domain) to control what the guest is allowed to do once a threat is
>> detected. This has been done over the mem_event mechanism.
>>
>> Here is a summary of the series:
>>
>> a  1/4 xen: Emulate with no writes
>> a  2/4 xen: Optimize introspection access to guest state
>> A  3/4 xen, libxc: Force-enable relevant MSR events
>> -  4/4 xen: Handle resumed instruction based on previous mem_event reply
> 
> For the x86/mm and mem_event parts, 
> 
> Acked-by: Tim Deegan <tim@xxxxxxx>

Thanks!


Regards,
Razvan Cojocaru

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.