[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Ubuntu 16.04.1 LTS kernel 4.4.0-57 over-allocation and xen-access fail
On Tue, Jan 10, 2017 at 8:35 AM, Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> wrote:
(replying to all): I'm not in favor of this patch mainly because it is not stealthy. A
malicious kernel could easily track what events are being sent on the
ring. With DRAKVUF I could work around this using altp2m pfn-remapping,
but for other tools this is can be a serious information leak. Tamas _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |