From: Razvan Cojocaru <rcojocaru@bitdefender.com>
To: xen-devel@lists.xen.org
Cc: kevin.tian@intel.com, ian.campbell@citrix.com,
stefano.stabellini@eu.citrix.com, andrew.cooper3@citrix.com,
ian.jackson@eu.citrix.com, Tim Deegan <tim@xen.org>,
Jan Beulich <JBeulich@suse.com>,
Eddie Dong <eddie.dong@intel.com>,
Jun Nakajima <jun.nakajima@intel.com>
Subject: [PATCH RFC V11 0/5] Basic guest memory introspection support
Date: Tue, 02 Sep 2014 18:37:09 +0300 [thread overview]
Message-ID: <5405E425.9070604@bitdefender.com> (raw)
I apologize, I've sent this as a duplicate V10.
Here it is, resent (correctly) as V11. Sorry.
As stated originally, we had to modify Xen in order to be able to detect
rootkits in HVM guests, in a way that allows an application that runs in
dom0 (or a similarly privileged domain) to control what the guest is
allowed to do once a threat is detected. This has been done over the
mem_event mechanism.
To this end, we needed to:
1. Be able to execute the current instruction without allowing it to
write to memory. This is done based on new mem_event response
fields sent from the controlling application.
2. Have the guest as responsive as possible amid all the processing. So
we had to cache some information with each mem_event sent.
3. Not allow the hypervisor to disable sending information about
interesting MSR events.
4. Add an additional mem_event type, namely a VMCALL event - in order to
do its work, our application occasionally triggers VMCALLs in the guest
(not included in the current series, but included in the initial RFC
series).
5. Add an additional libxc function that allows triggering page faults
in the guest.
Changes since V9:
- The "xen, libxc: Request page fault injection via libxc" has
been reworked to extend HVMOP_inject_trap instead of a new
libxc hypercall.
Patches:
xen: Handle resumed instruction based on previous mem_event reply
xen, libxc: Request page fault injection via libxc
xen, libxc: Force-enable relevant MSR events
xen: Optimize introspection access to guest state
xen: Emulate with no writes
Thanks,
Razvan Cojocaru
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
next reply other threads:[~2014-09-02 15:37 UTC|newest]
Thread overview: 4+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-09-02 15:37 Razvan Cojocaru [this message]
2014-09-02 18:53 ` [PATCH RFC V11 0/5] Basic guest memory introspection support Konrad Rzeszutek Wilk
2014-09-02 19:13 ` Razvan Cojocaru
2014-09-02 20:15 ` Konrad Rzeszutek Wilk
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=5405E425.9070604@bitdefender.com \
--to=rcojocaru@bitdefender.com \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=eddie.dong@intel.com \
--cc=ian.campbell@citrix.com \
--cc=ian.jackson@eu.citrix.com \
--cc=jun.nakajima@intel.com \
--cc=kevin.tian@intel.com \
--cc=stefano.stabellini@eu.citrix.com \
--cc=tim@xen.org \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.