Re: [RFC PATCH v6 76/92] kvm: x86: disable EPT A/D bits if introspection is present

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 13/08/19 20:36, Mihai Donțu wrote:
>> Why?
> When EPT A/D is enabled, all guest page table walks are treated as
> writes (like AMD's NPT). Thus, an introspection tool hooking the guest
> page tables would trigger a flood of VMEXITs (EPT write violations)
> that will get the introspected VM into an unusable state.
> 
> Our implementation of such an introspection tool builds a cache of
> {cr3, gva} -> gpa, which is why it needs to monitor all guest PTs by
> hooking them for write.

Please include the kvm list too.

One issue here is that it changes the nested VMX ABI.  Can you leave EPT
A/D in place for the shadow EPT MMU, but not for "regular" EPT pages?

Also, what is the state of introspection support on AMD?

Paolo



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux