On Thursday, April 6, 2017, W. Michael Petullo wrote:
> >> I am writing some software that monitors a guest VM using
> virtual-machine
> >> introspection and "hijacks" system calls under certain conditions. For
> >> example, the program might inject an int3/breakpoint into the
>> I am writing some software that monitors a guest VM using virtual-machine
>> introspection and "hijacks" system calls under certain conditions. For
>> example, the program might inject an int3/breakpoint into the guest
>> kernel at the entry point to sys_open. When the breakpoint is hit, the
>>
On Thursday, April 6, 2017, W. Michael Petullo wrote:
> I am writing some software that monitors a guest VM using virtual-machine
> introspection and "hijacks" system calls under certain conditions. For
> example, the program might inject an int3/breakpoint into the guest
> kernel
I am writing some software that monitors a guest VM using virtual-machine
introspection and "hijacks" system calls under certain conditions. For
example, the program might inject an int3/breakpoint into the guest
kernel at the entry point to sys_open. When the breakpoint is hit, the
program might