[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] vm_event: Implement ARM SMC events
On Tue, Apr 12, 2016 at 11:05 AM, Corneliu ZUZU <czuzu@xxxxxxxxxxxxxxx> wrote:
Right, actually I believe KVM already implemented this, I was just under the impression it was only for aarch64. As for performance overhead I'm not that worried about it, rather I need to make sure the presence of the monitoring can remain stealthy. I know on KVM for example this type of trapping renders the guest to be unable to use singlestepping, which would easily reveal the presence of the external monitor (see https://lists.cs.columbia.edu/pipermail/kvmarm/2015-May/014589.html). So this will need to be looked at carefully.
I don't see a problem with that, as long as it's configurable whether SMC calls are trapped or pass-through.
Sure, HVC would also be a possibility but I do see use-cases for trapping SMC calls and forwarding them to a guest
instead of the TZ. For example, if malware tries to
exploit TZ vulnerabilities, it would be a lot easier to contain and
monitor such exploits if the TZ is virtualized rather then just crashing
the guest or forwarding the calls to a real TZ. So trapping SMC would allow us
to use the real TZ for other purposes and maintain a barrier between malicious guests and the TZ. TamasSo what I will do instead of issuing a software_breakpoint vm_event for SMCs, I'll introduce a new type, say VM_EVENT_REASON_PRIVILEGED_CALL, that can be used to forward both hypercalls and SMCs to a monitoring guest. This would also allow us to use the software_breakpoint type for the actual software breakpoint events in the future. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |