Re: [PATCH V6 0/8] KVM: X86: Introducing ROE Protection Kernel Hardening

2018-11-08 Thread Ahmed Soliman
Hello, > Do you have patches that enable usage of ROE in the kernel? > Alternatively you can write testcases in tools/testing/selftests/kvm to > test how guests should use it. As for now ROE isn't integrated yet into the kernel, I did have some tests I will have them in selftests/kvm in the next

Re: [PATCH V6 0/8] KVM: X86: Introducing ROE Protection Kernel Hardening

2018-11-08 Thread Paolo Bonzini
On 04/11/2018 18:11, Ahmed Abd El Mawgood wrote: > Our model assumes that an attacker got full root access to a running guest and > his goal is to manipulate kernel code/data (hook syscalls, overwrite IDT > ..etc). > > There is future work in progress to also put some sort of protection on the >

[PATCH V6 0/8] KVM: X86: Introducing ROE Protection Kernel Hardening

2018-11-04 Thread Ahmed Abd El Mawgood
-- Summary -- ROE is a hypercall that enables host operating system to restrict guest's access to its own memory. This will provide a hardening mechanism that can be used to stop rootkits from manipulating kernel static data structures and code. Once a memory region is protected the guest kernel c