From: Ahmed Abd El Mawgood <ahmedsoliman0x666@gmail.com>
To: kvm@vger.kernel.org,
Kernel Hardening <kernel-hardening@lists.openwall.com>,
virtualization@lists.linux-foundation.org,
linux-doc@vger.kernel.org, x86@kernel.org
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>,
Kees Cook <keescook@chromium.org>, nathan Corbet <corbet@lwn.net>,
David Vrabel <david.vrabel@nutanix.com>,
rkrcmar@redhat.com, Boris Lukashev <blukashev@sempervictus.com>,
Ingo Molnar <mingo@redhat.com>,
nigel.edwards@hpe.com, hpa@zytor.com,
Paolo Bonzini <pbonzini@redhat.com>,
Thomas Gleixner <tglx@linutronix.de>,
Rik van Riel <riel@surriel.com>
Subject: Memory Read Only Enforcement: VMM assisted kernel rootkit mitigation for KVM
Date: Thu, 19 Jul 2018 23:37:59 +0200 [thread overview]
Message-ID: <20180719213802.17161-1-ahmedsoliman0x666@gmail.com> (raw)
Hi,
This is my first set of patches that works as I would expect, and the
third revision I sent to mailing lists.
Following up with my previous discussions about kernel rootkit mitigation
via placing R/O protection on critical data structure, static data,
privileged registers with static content. These patches present the
first part where it is only possible to place these protections on
memory pages. Feature-wise, this set of patches is incomplete in the sense of:
- They still don't protect privileged registers
- They don't protect guest TLB from malicious gva -> gpa page mappings.
But they provide sketches for a basic working design. Note that I am totally
noob and it took lots of time and effort to get to this point. So sorry in
advance if I overlooked something.
[PATCH 1/3] [RFC V3] KVM: X86: Memory ROE documentation
[PATCH 2/3] [RFC V3] KVM: X86: Adding arbitrary data pointer in kvm memslot itterator functions
[PATCH 3/3] [RFC V3] KVM: X86: Adding skeleton for Memory ROE
Summery:
Documentation/virtual/kvm/hypercalls.txt | 14 ++++
arch/x86/include/asm/kvm_host.h | 11 ++-
arch/x86/kvm/Kconfig | 7 ++
arch/x86/kvm/mmu.c | 127 ++++++++++++++++++++++---------
arch/x86/kvm/x86.c | 82 +++++++++++++++++++-
include/linux/kvm_host.h | 3 +
include/uapi/linux/kvm_para.h | 1 +
virt/kvm/kvm_main.c | 29 ++++++-
8 files changed, 232 insertions(+), 42 deletions(-)
next reply other threads:[~2018-07-19 21:37 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-07-19 21:37 Ahmed Abd El Mawgood [this message]
2018-07-19 21:38 ` [PATCH 1/3] [RFC V3] KVM: X86: Memory ROE documentation Ahmed Abd El Mawgood
2018-07-19 21:38 ` [PATCH 2/3] [RFC V3] KVM: X86: Adding arbitrary data pointer in kvm memslot itterator functions Ahmed Abd El Mawgood
2018-07-19 21:38 ` [PATCH 3/3] [RFC V3] KVM: X86: Adding skeleton for Memory ROE Ahmed Abd El Mawgood
[not found] ` <20180719213802.17161-4-ahmedsoliman0x666@gmail.com>
[not found] ` <CAG48ez3EyU=ROBczUdHEuOYBtZghYqOpq3K16Bs4RQLO1OO6oA@mail.gmail.com>
2018-07-20 0:26 ` Ahmed Soliman
[not found] ` <CAG48ez0+KiOhyX1R3=FjWQe5M0MFZ5GC=AkV6ZiSYK3OBXsS+A@mail.gmail.com>
2018-07-20 14:44 ` Ahmed Soliman
2018-07-20 1:07 ` Randy Dunlap
[not found] ` <20180719213802.17161-2-ahmedsoliman0x666@gmail.com>
2018-07-20 1:11 ` [PATCH 1/3] [RFC V3] KVM: X86: Memory ROE documentation Randy Dunlap
2018-07-20 2:45 ` Memory Read Only Enforcement: VMM assisted kernel rootkit mitigation for KVM Konrad Rzeszutek Wilk
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180719213802.17161-1-ahmedsoliman0x666@gmail.com \
--to=ahmedsoliman0x666@gmail.com \
--cc=ard.biesheuvel@linaro.org \
--cc=blukashev@sempervictus.com \
--cc=corbet@lwn.net \
--cc=david.vrabel@nutanix.com \
--cc=hpa@zytor.com \
--cc=keescook@chromium.org \
--cc=kernel-hardening@lists.openwall.com \
--cc=kvm@vger.kernel.org \
--cc=linux-doc@vger.kernel.org \
--cc=mingo@redhat.com \
--cc=nigel.edwards@hpe.com \
--cc=pbonzini@redhat.com \
--cc=riel@surriel.com \
--cc=rkrcmar@redhat.com \
--cc=tglx@linutronix.de \
--cc=virtualization@lists.linux-foundation.org \
--cc=x86@kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).