[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [PATCH v1 0/7] Implement support for external IPT monitoring


  • To: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • From: "Kang, Luwei" <luwei.kang@xxxxxxxxx>
  • Date: Wed, 17 Jun 2020 23:29:58 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=08dvXD0VOFNYFfzaJYFsjbsUJIMlXCK9Yu42D5i9cfs=; b=QmR50JfAGmsbB/o0LRjNOVc5lhp9hcvl7kaG+IX1uMxlnc0wgueOzj/Xh3U5jsJ4MAPeUGRaxAZGgddjQHhyyzRiqW2ZrkjhfWyj9Ed7bHX0+08v6kxXRCsutur+nrl0BB/wDDkdnWhjbUOvVBpRA02Bx1cAFUNJQVLlaSF7xlw1tnM/WMzxpekv8Kz1i0wZ6QMj0q2HxZpfVcNlxNYUmgUsOaCmLzxWX9QLQWnT46ZELTBgO986nMVCIPNiLJzzvRyMq/jFM/ZfF1AVG+4Pv3uSKMqnuMUGhQfJGNGrn90nzmhCrHWsb819lRr67DM36fBExzuFTBSAq/NROC8kxA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OMSgwHCa9oE0NDJw20SbewPdTDj6DF+qhq+f94h5Cd003S68zKyAqE2Z/zTuIuqgAbFICxAzP8stGvOEZAKFjV/oZQEQs0raDO+U/vTPgpjPB2KWk9VUB47DMf103cKNWO4MNGwaKuWqYt1UAuzp+Oy13wjqAItNF9F0PzEUm8tsKOYfrG5+xKiFQFpJugHyKebadR809dmp05qYyQC6WG6gvT8xHS7jjGhN4kbYBVAAgL3OPQAGuxXA32WK2UunU4ZnYh6w0uMwetE62wYiETuzFh3qD9o0hLB+UVkf5aPvbA+J6VtfrEVyasp2NexUJ91eCkGH9P9tsusDv9ftQA==
  • Authentication-results: citrix.com; dkim=none (message not signed) header.d=none;citrix.com; dmarc=none action=none header.from=intel.com;
  • Cc: "Tian, Kevin" <kevin.tian@xxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, "Nakajima, Jun" <jun.nakajima@xxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Michał Leszczyński <michal.leszczynski@xxxxxxx>, Ian Jackson <ian.jackson@xxxxxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 17 Jun 2020 23:30:25 +0000
  • Dlp-product: dlpe-windows
  • Dlp-reaction: no-action
  • Dlp-version: 11.2.0.6
  • Ironport-sdr: dZpLAHVXOx0EZRmVKRVjvDs2ykDPabbixeE9dfu+qxAdOiF+kw7lJ0drKvraZtoogRtsEDxQOx 2ctg6ljBaZbA==
  • Ironport-sdr: PptEuZ2UZYUbLPDgRhGTrwxs1DP58y5WCUXbKXdAf3NwgBGW2qeb2DufAz4HCrBXKu9CZclvFj aYZWb70rOh8w==
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: KAn5ItxMsuAqHW3ZzkheyNf1oni9hpiVzvKAgAAIowCAAHHNAIAAVp/wgAArhICAADbMIIAABJuAgACxxQA=
  • Thread-topic: [PATCH v1 0/7] Implement support for external IPT monitoring

> > > How does KVM deal with this, do they insert/modify trace packets on
> > > trapped and emulated instructions by the VMM?
> >
> > The KVM includes instruction decoder and
> emulator(arch/x86/kvm/emulate.c), and the guest's memory can be set to
> write-protect as well. But it doesn't support Intel PT packets software 
> emulator.
> For KVM, the Intel PT feature will be exposed to KVM guest and KVM guest can
> use Intel PT feature like native.
> 
> But if such feature is exposed to the guest for it's own usage, won't it be
> missing packets for instructions emulated by the VMM?

If setting the guest's memory write-protect, I think yes. 

Thanks,
Luwei Kang

> 
> Thanks, Roger.

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.