Re: [PATCH V7 0/10] KVM: X86: Introducing ROE Protection Kernel Hardening

2018-12-21 Thread Ahmed Soliman
Hello, > > I don't understand why this path needs to be optimized. To me it seems, a > > straight- > > forward userspace implementation with no additional code in the kernel > > achieves > > the same feature. Can you elaborate? I was doing some benchmarking to figure out the overhead introduce

Re: [PATCH V7 0/10] KVM: X86: Introducing ROE Protection Kernel Hardening

2018-12-13 Thread Ahmed Soliman
Hello, > Given that writes to these areas should be exceptional occurrences, No not in the case of partially protected page. > I don't understand why this path needs to be optimized. To me it seems, a > straight- > forward userspace implementation with no additional code in the kernel > achie

Re: [PATCH V6 0/8] KVM: X86: Introducing ROE Protection Kernel Hardening

2018-11-08 Thread Ahmed Soliman
Hello, > Do you have patches that enable usage of ROE in the kernel? > Alternatively you can write testcases in tools/testing/selftests/kvm to > test how guests should use it. As for now ROE isn't integrated yet into the kernel, I did have some tests I will have them in selftests/kvm in the next

Re: [PATCH V5 0/5] KVM: X86: Introducing ROE Protection Kernel Hardening

2018-10-31 Thread Ahmed Soliman
Hello Igor, > This is very interesting, because it seems a very good match to the work > I'm doing, for supporting the creation of more targets for protection: > > https://www.openwall.com/lists/kernel-hardening/2018/10/23/3 > > In my case the protection would extend also to write-rate type of data

Re: gRe: [PATCH V5 1/5] KVM: X86: Memory ROE documentation

2018-10-31 Thread Ahmed Soliman
On Mon, 29 Oct 2018 at 18:42, Sean Christopherson wrote: > > On Fri, Oct 26, 2018 at 05:12:19PM +0200, Ahmed Abd El Mawgood wrote: > > Following up with my previous threads on KVM assisted Anti rootkit > > protections. > > All of the changelogs in this series need to be rewritten to adhere to > Do

Re: [PATCH V5 0/5] KVM: X86: Introducing ROE Protection Kernel Hardening

2018-10-30 Thread Ahmed Soliman
On Mon, 29 Oct 2018 at 08:46, Ingo Molnar wrote: > > > * Ahmed Abd El Mawgood wrote: > > > This is the 5th version which is 4th version with minor fixes. ROE is a > > hypercall that enables host operating system to restrict guest's access to > > its > > own memory. This will provide a hardening