xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
To: Razvan Cojocaru <rcojocaru@bitdefender.com>
Cc: Tim Deegan <tim@xen.org>,
	kevin.tian@intel.com, ian.campbell@citrix.com,
	stefano.stabellini@eu.citrix.com,
	Jun Nakajima <jun.nakajima@intel.com>,
	andrew.cooper3@citrix.com, ian.jackson@eu.citrix.com,
	xen-devel@lists.xen.org, Eddie Dong <eddie.dong@intel.com>,
	Jan Beulich <JBeulich@suse.com>
Subject: Re: [PATCH RFC V11 0/5] Basic guest memory introspection support
Date: Tue, 2 Sep 2014 14:53:50 -0400	[thread overview]
Message-ID: <20140902185350.GA2893@laptop.dumpdata.com> (raw)
In-Reply-To: <5405E425.9070604@bitdefender.com>

On Tue, Sep 02, 2014 at 06:37:09PM +0300, Razvan Cojocaru wrote:
> I apologize, I've sent this as a duplicate V10.
> Here it is, resent (correctly) as V11. Sorry.

You also have the RFC part on the patchset. Is that intentional?
Some maintainers (looks at himself) ignore (well, put it in the
'todo pile' to be exact) patches like that until they are
more mature (non-RFC) and then they will review them.

I think the RFC part of the patches has been rubbed up as
the design is pretty baked?

> 
> As stated originally, we had to modify Xen in order to be able to detect
> rootkits in HVM guests, in a way that allows an application that runs in
> dom0 (or a similarly privileged domain) to control what the guest is
> allowed to do once a threat is detected. This has been done over the
> mem_event mechanism.
> 
> To this end, we needed to:
> 
> 1. Be able to execute the current instruction without allowing it to
> write to memory. This is done based on new mem_event response
> fields sent from the controlling application.
> 
> 2. Have the guest as responsive as possible amid all the processing. So
> we had to cache some information with each mem_event sent.
> 
> 3. Not allow the hypervisor to disable sending information about
> interesting MSR events.
> 
> 4. Add an additional mem_event type, namely a VMCALL event - in order to
> do its work, our application occasionally triggers VMCALLs in the guest
> (not included in the current series, but included in the initial RFC
> series).
> 
> 5. Add an additional libxc function that allows triggering page faults
> in the guest.
> 
> Changes since V9:
>  - The "xen, libxc: Request page fault injection via libxc" has
>    been reworked to extend HVMOP_inject_trap instead of a new
>    libxc hypercall.
> 
> Patches:
> 
> xen: Handle resumed instruction based on previous mem_event reply
> xen, libxc: Request page fault injection via libxc
> xen, libxc: Force-enable relevant MSR events
> xen: Optimize introspection access to guest state
> xen: Emulate with no writes
> 
> 
> Thanks,
> Razvan Cojocaru
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel

  reply	other threads:[~2014-09-02 18:53 UTC|newest]

Thread overview: 4+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-09-02 15:37 [PATCH RFC V11 0/5] Basic guest memory introspection support Razvan Cojocaru
2014-09-02 18:53 ` Konrad Rzeszutek Wilk [this message]
2014-09-02 19:13   ` Razvan Cojocaru
2014-09-02 20:15     ` Konrad Rzeszutek Wilk

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20140902185350.GA2893@laptop.dumpdata.com \
    --to=konrad.wilk@oracle.com \
    --cc=JBeulich@suse.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=eddie.dong@intel.com \
    --cc=ian.campbell@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=jun.nakajima@intel.com \
    --cc=kevin.tian@intel.com \
    --cc=rcojocaru@bitdefender.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=tim@xen.org \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).