Il 17/03/2014 12:54, Alexander Binun ha scritto:
Dear friends, great thanks!

To summarize: we are trying to monitor VCPU IDT changes that are done
by external parties (e.g. rootkits) and not by intra-KVM machinery.
Are there parameters that witness such changes ?

There is no way to intercept changes to the interrupt descriptor table.

You can:

* look at the IDTR values on every vmexit, including before injecting an interrupt, but that won't protect from hijacking software interrupts such as int $0x80;

* protect the IDT from writing using KVM's page table mechanisms, but that won't catch the case when the IDT is changed to a whole new page.

Paolo

Reply via email to