Re: x86_64 INIT/SIPI Bug

2018-11-09 Thread Sean Christopherson
On Fri, Nov 09, 2018 at 11:04:59AM -0700, Rian Quinn wrote: > >> I apologize upfront if this is the wrong place to post this, pretty new to > >> this. > >> > >> We are working on the Bareflank Hypervisor (www.bareflank.org), and we > >> are passing through the INIT/SIPI process (similar to how a

Re: x86_64 INIT/SIPI Bug

2018-11-09 Thread Sean Christopherson
On Fri, Nov 09, 2018 at 11:04:59AM -0700, Rian Quinn wrote: > >> I apologize upfront if this is the wrong place to post this, pretty new to > >> this. > >> > >> We are working on the Bareflank Hypervisor (www.bareflank.org), and we > >> are passing through the INIT/SIPI process (similar to how a

Re: x86_64 INIT/SIPI Bug

2018-11-09 Thread Rian Quinn
>> I apologize upfront if this is the wrong place to post this, pretty new to >> this. >> >> We are working on the Bareflank Hypervisor (www.bareflank.org), and we >> are passing through the INIT/SIPI process (similar to how a VMX >> rootkit from EFI might boot the OS) and we noticed that on Arch

Re: x86_64 INIT/SIPI Bug

2018-11-09 Thread Rian Quinn
>> I apologize upfront if this is the wrong place to post this, pretty new to >> this. >> >> We are working on the Bareflank Hypervisor (www.bareflank.org), and we >> are passing through the INIT/SIPI process (similar to how a VMX >> rootkit from EFI might boot the OS) and we noticed that on Arch

Re: x86_64 INIT/SIPI Bug

2018-11-09 Thread Sean Christopherson
On Thu, Nov 08, 2018 at 03:23:59PM -0700, Rian Quinn wrote: > I apologize upfront if this is the wrong place to post this, pretty new to > this. > > We are working on the Bareflank Hypervisor (www.bareflank.org), and we > are passing through the INIT/SIPI process (similar to how a VMX > rootkit

Re: x86_64 INIT/SIPI Bug

2018-11-09 Thread Sean Christopherson
On Thu, Nov 08, 2018 at 03:23:59PM -0700, Rian Quinn wrote: > I apologize upfront if this is the wrong place to post this, pretty new to > this. > > We are working on the Bareflank Hypervisor (www.bareflank.org), and we > are passing through the INIT/SIPI process (similar to how a VMX > rootkit

Re: x86_64 INIT/SIPI Bug

2018-11-09 Thread Rian Quinn
>> I apologize upfront if this is the wrong place to post this, pretty new to >> this. >> >> We are working on the Bareflank Hypervisor (www.bareflank.org), and we >> are passing through the INIT/SIPI process (similar to how a VMX >> rootkit from EFI might boot the OS) and we noticed that on Arch

Re: x86_64 INIT/SIPI Bug

2018-11-09 Thread Rian Quinn
>> I apologize upfront if this is the wrong place to post this, pretty new to >> this. >> >> We are working on the Bareflank Hypervisor (www.bareflank.org), and we >> are passing through the INIT/SIPI process (similar to how a VMX >> rootkit from EFI might boot the OS) and we noticed that on Arch

Re: x86_64 INIT/SIPI Bug

2018-11-08 Thread Eric W. Biederman
Rian Quinn writes: > I apologize upfront if this is the wrong place to post this, pretty new to > this. > > We are working on the Bareflank Hypervisor (www.bareflank.org), and we > are passing through the INIT/SIPI process (similar to how a VMX > rootkit from EFI might boot the OS) and we

Re: x86_64 INIT/SIPI Bug

2018-11-08 Thread Eric W. Biederman
Rian Quinn writes: > I apologize upfront if this is the wrong place to post this, pretty new to > this. > > We are working on the Bareflank Hypervisor (www.bareflank.org), and we > are passing through the INIT/SIPI process (similar to how a VMX > rootkit from EFI might boot the OS) and we

x86_64 INIT/SIPI Bug

2018-11-08 Thread Rian Quinn
I apologize upfront if this is the wrong place to post this, pretty new to this. We are working on the Bareflank Hypervisor (www.bareflank.org), and we are passing through the INIT/SIPI process (similar to how a VMX rootkit from EFI might boot the OS) and we noticed that on Arch Linux, the

x86_64 INIT/SIPI Bug

2018-11-08 Thread Rian Quinn
I apologize upfront if this is the wrong place to post this, pretty new to this. We are working on the Bareflank Hypervisor (www.bareflank.org), and we are passing through the INIT/SIPI process (similar to how a VMX rootkit from EFI might boot the OS) and we noticed that on Arch Linux, the