Changes to Apple Silicon put the @AsahiLinux project at odds with adding support for the M4 chips
https://www.linux-magazine.com/Online/News/Asahi-Linux-Runs-into-Issues-with-M4-Support?utm_source=MLM
#Linux #Asahi #AppleSilicon #M4 #XNU #hypervisor
Changes to Apple Silicon put the @AsahiLinux project at odds with adding support for the M4 chips
https://www.linux-magazine.com/Online/News/Asahi-Linux-Runs-into-Issues-with-M4-Support?utm_source=MLM
#Linux #Asahi #AppleSilicon #M4 #XNU #hypervisor
Proxmox VE 8.4 released on Debian 12.10 base with Linux Kernel 6.8.12, live migration support with mediated devices, API for third-party backup solutions, Virtiofs directory passthrough
https://proxmox.com/en/about/company-details/press-releases/proxmox-virtual-environment-8-4
What do you miss in #Proxmox or #XCPng?
My customers often told me, that when migrating from #VMware based setups, they would miss something like #DRS. As a result I published #ProxLB as a load balancer. Now, I do the same for #DPM and also some other things. What do you miss or what stops you or your business from switching to Proxmox or XCPng?
To date, I have published 15 articles (1045 pages) with the strict goal of helping the cybersecurity community.
ERS (439 pages, so far):
[+] ERS 05: https://exploitreversing.com/2025/03/12/exploiting-reversing-er-series-article-05/
[+] ERS 04: https://exploitreversing.com/2025/02/04/exploiting-reversing-er-series-article-04/
[+] ERS 03: https://exploitreversing.com/2025/01/22/exploiting-reversing-er-series-article-03/
[+] ERS 02: https://exploitreversing.com/2024/01/03/exploiting-reversing-er-series-article-02/
[+] ERS 01: https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series/
MAS (606 pages -- finished):
[+] MAS 10: https://exploitreversing.com/2025/01/15/malware-analysis-series-mas-article-10/
[+] MAS 09: https://exploitreversing.com/2025/01/08/malware-analysis-series-mas-article-09/
[+] MAS 09: https://exploitreversing.com/2024/08/07/malware-analysis-series-mas-article-08/
[+] MAS 07: https://exploitreversing.com/2023/01/05/malware-analysis-series-mas-article-7/
[+] MAS 06: https://exploitreversing.com/2022/11/24/malware-analysis-series-mas-article-6/
[+] MAS 05: https://exploitreversing.com/2022/09/14/malware-analysis-series-mas-article-5/
[+] MAS 04: https://exploitreversing.com/2022/05/12/malware-analysis-series-mas-article-4/
[+] MAS 03: https://exploitreversing.com/2022/05/05/malware-analysis-series-mas-article-3/
[+] MAS 02: https://exploitreversing.com/2022/02/03/malware-analysis-series-mas-article-2/
[+] MAS 01: https://exploitreversing.com/2021/12/03/malware-analysis-series-mas-article-1/
The blog home page is: https://exploitreversing.com/
I will be back in a few months with the next articles in the Exploiting Reversing series, which will focus on vulnerability and exploitation, once I have laid all the necessary groundwork. I'm currently taking a break from writing to focus on research.
Enjoy reading and have an excellent day.
#Xbox 360 modders have discovered a new way to get homebrew apps and games running on the console. A new software-only exploit known as #BadUpdate allows you to use a #USB key to hack past #Microsoft #Hypervisor protections and run unsigned #code and #games https://github.com/grimdoomer/Xbox360BadUpdate
#Xen 4.20.0 has been released (#XenProject / #XenProjectHypervisor / #XenHypervisor / #Hypervisor / #Virtualization / #LinuxFoundation) https://xenproject.org/
I'm currently looking for people with low level #firmware, #hypervisor and/or #virtio experience. Flexible contract or full time possibility. My DMs are open for CVs, ideally with pointers to #upstream contributions. #getfedihired #fedihire #jobs
Xen 4.20 open-source type-1 hypervisor brings Arm LLC coloring, AMD Zen 5 support, Intel EPT Paging-Write, and more.
https://linuxiac.com/xen-4-20-hypervisor-brings-amd-zen-5-support/
Hacking the Xbox 360 Hypervisor:
01. Hacking the Xbox 360 Hypervisor Part 1: System Overview: https://icode4.coffee/?p=1047
02. Hacking the Xbox 360 Hypervisor Part 2: The Bad Update Exploit: https://icode4.coffee/?p=1081
Low Latency (<2ms) process execution in a VM via a hypervisor, not a sandbox!?
I'm not going to pretend to understand all the limitations of a sandbox but I believe that we have solid hypervisors.
What you need to do to download VMWare Fusion and Workstation for free.
Added 𝗨𝗣𝗗𝗔𝗧𝗘 𝟯 [UPDATE 3] to 𝗙𝗿𝗲𝗲𝗕𝗦𝗗 𝗕𝗵𝘆𝘃𝗲 𝗩𝗶𝗿𝘁𝘂𝗮𝗹𝗶𝘇𝗮𝘁𝗶𝗼𝗻 [FreeBSD Bhyve Virtualization] article.
https://vermaden.wordpress.com/2023/08/18/freebsd-bhyve-virtualization/
primary issue that hinders #virtualization on #ARM is the way sensitive instructions of its ISA are executed. Sensitive instructions
are a class of instructions in the ISA that can change the mode of operation of the processor
or access specific information regarding the state of various hardware resources in the system.
Such instructions thus have the capability of superseding the #hypervisor
KVM/ARM manages the shadow page tables in the host
kernel. These tables map the guest virtual addresses to actual physical addresses to speed up
the translation. Figure 4.4 also illustrates the concept of shadow tables. KVM/ARM establishes
this mapping on demand. Changes in the guest virtual page table must be accurately mapped
onto the shadow page table. This is taken care of by KVM/ARM because whenever the guest
changes the page table, it has to invalidate the TLB entry associated with that page. As this
is a privileged operation, it traps to the KVM/ARM module where appropriate changes to the
shadow page table are made. Every time a new mapping is created in the shadow page table
After this, we were able to use the
Android operating system on the ARM PB11MPCORE board. The keyboard was used to send
the control inputs and we tested various activities like launching the browser, launching other
pre-installed applications like the clock and the calendar. We also tested installing applications
using Android application installation files (.apk), which was successful.
https://arcb.csc.ncsu.edu/~mueller/ftp/pub/mueller/theses/ramasubramanian-th.pdf
BlackPill is a stealthy Linux rootkit made in Rust.
BlackPill is a stealthy Linux rootkit made in Rust.
My partner keeps saying we need to deep clean for new year. Might not be what's meant by that, but just did the biggest deep cleaning possible. I deleted my #Google account, my last Big Tech account.
It wasn't used for much, but some last #smarthome stuff was on it. Well, I got a little PC for Xmas which now runs #Linux with a #pihole and a #hypervisor with #homeassistant .
3 days of hobbying to set it up + finally done with Google? Yes please! Thank you @homeassistant for making it possible!
A concept is tolerated inside the microkernel only if moving it outside the kernel, i.e., permitting competing implementations, would prevent the implementation of the system's required functionality
OKL4 μKernel 3.0, released in October 2008, was the last open-source version of OKL4 μKernel. More recent versions are closed source and based on a rewrite to support a native #hypervisor variant named the OKL4 Microvisor. OK Labs also distributed a paravirtualized #Linux named OK:Linux, a descendant of Wombat, and paravirtualized versions of #SymbianOS and #Android
Osker, an OS written in Haskell, targeted the L4 specification; although this project focused mainly on the use of a functional programming language for OS development, not on microkernel research.[
RedoxOS is a Rust based operating system, that is also inspired by seL4, and uses a micro kernel design.
#virtualization
VMware Fusion And Workstation Are Now Free For All #announcements #news #virtualization #vmware_workstation #hypervisor #vmware #vmware_fusion
https://ostechnix.com/vmware-fusion-and-workstation-are-now-free-for-all/