Re: [Xen-devel] Tracking guest code execution with EPT violations

2015-01-29 Thread Tim Deegan
Hi, At 14:09 + on 23 Jan (1422018568), kevin.ma...@gdata.de wrote: > My idea was that when a guest wants to access a new page (let`s say > a guest wants to start a new process and therefore needs to copy the > code into the memory) then an EPT-violation should be raised because > the correspon

Re: [Xen-devel] Tracking guest code execution with EPT violations

2015-01-23 Thread Kevin.Mayer
Thanks for your reply. > Hi, > > > So whenever a nonexisting memory page gets requested an EPT violation is > caused (and handled by ept_handle_violation). Extending the > EXIT_REASON_EPT_VIOLATION I should be able to set the access rights for > every new page to access_rw(By using the p2m->get_e

Re: [Xen-devel] Tracking guest code execution with EPT violations

2015-01-22 Thread Tim Deegan
Hi, At 16:25 + on 16 Jan (1421421905), kevin.ma...@gdata.de wrote: > So whenever a nonexisting memory page gets requested an EPT violation is > caused (and handled by ept_handle_violation). Extending the > EXIT_REASON_EPT_VIOLATION I should be able to set the access rights for every > new

[Xen-devel] Tracking guest code execution with EPT violations

2015-01-16 Thread Kevin.Mayer
Hi all I`m trying to track code execution with page granularity by setting the access rights in the EPT to not executable on Xen 4.4.1. The idea is as follows: According to the intel manual "A reference using a guest-physical address whose translation encounters an EPT paging-structure that is