From mboxrd@z Thu Jan 1 00:00:00 1970 From: George Dunlap Subject: Re: [PATCH V3 1/3] xen/mem_access: Support for memory-content hiding Date: Tue, 7 Jul 2015 11:51:23 +0100 Message-ID: <559BAF2B.60200@eu.citrix.com> References: <1436197873-4559-1-git-send-email-rcojocaru@bitdefender.com> <1436197873-4559-2-git-send-email-rcojocaru@bitdefender.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1436197873-4559-2-git-send-email-rcojocaru@bitdefender.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Razvan Cojocaru , xen-devel@lists.xen.org Cc: kevin.tian@intel.com, keir@xen.org, eddie.dong@intel.com, stefano.stabellini@eu.citrix.com, jun.nakajima@intel.com, andrew.cooper3@citrix.com, ian.jackson@eu.citrix.com, Aravind.Gopalakrishnan@amd.com, jbeulich@suse.com, tlengyel@novetta.com, wei.liu2@citrix.com, boris.ostrovsky@oracle.com, suravee.suthikulpanit@amd.com, ian.campbell@citrix.com List-Id: xen-devel@lists.xenproject.org On 07/06/2015 04:51 PM, Razvan Cojocaru wrote: > This patch adds support for memory-content hiding, by modifying the > value returned by emulated instructions that read certain memory > addresses that contain sensitive data. The patch only applies to > cases where MEM_ACCESS_EMULATE or MEM_ACCESS_EMULATE_NOWRITE have > been set to a vm_event response. > > Signed-off-by: Razvan Cojocaru MM bits: Acked-by: George Dunlap