[Xen-devel] [PATCH RFC V4 1/3] KVM: X86: Memory ROE documentation

2018-07-20 Thread Ahmed Abd El Mawgood
Following up with my previous threads on KVM assisted Anti rootkit protections. The current version doesn't address the attacks involving pages remapping. It is still design in progress, nevertheless, it will be in my later patch sets. Signed-off-by: Ahmed Abd El Mawgood --- Documentation

[Xen-devel] Memory Read Only Enforcement: VMM assisted kernel rootkit mitigation for KVM V4

2018-07-20 Thread Ahmed Abd El Mawgood
Here is change log from V3 To V4: - Fixing spelling/grammar mistakes suggested by Randy Dunlap - Changing the hypercall interface to be able to process multiple pages per one hypercall also suggested by Randy Dunlap. It turns out that this will save lots of vmexist/memory slot flushes when

[Xen-devel] [PATCH RFC V4 3/3] KVM: X86: Adding skeleton for Memory ROE

2018-07-20 Thread Ahmed Abd El Mawgood
guest virtual address -> guest physical address remapping, but there are plans to fix that. Signed-off-by: Ahmed Abd El Mawgood --- arch/x86/include/asm/kvm_host.h | 11 - arch/x86/kvm/Kconfig| 7 +++ arch/x86/kvm/mmu.c | 72 +++- arch/

[Xen-devel] [PATCH RFC V4 2/3] KVM: X86: Adding arbitrary data pointer in kvm memslot iterator functions

2018-07-20 Thread Ahmed Abd El Mawgood
This will help sharing data into the slot_level_handler callback. In my case I need to a share a counter for the pages traversed to use it in some bitmap. Being able to send arbitrary memory pointer into the slot_level_handler callback made it easy. Signed-off-by: Ahmed Abd El Mawgood --- arch