Series |
VM introspection
|
expand
-
[RFC,v6,00/92] VM introspection
-
[RFC,v6,01/92] kvm: introduce KVMI (VM introspection subsystem)
-
[RFC,v6,02/92] kvm: introspection: add basic ioctls (hook/unhook)
-
[RFC,v6,03/92] kvm: introspection: add permission access ioctls
-
[RFC,v6,04/92] kvm: introspection: add the read/dispatch message function
-
[RFC,v6,05/92] kvm: introspection: add KVMI_GET_VERSION
-
[RFC,v6,06/92] kvm: introspection: add KVMI_CONTROL_CMD_RESPONSE
-
[RFC,v6,07/92] kvm: introspection: honor the reply option when handling the KVMI_GET_VERSION command
-
[RFC,v6,08/92] kvm: introspection: add KVMI_CHECK_COMMAND and KVMI_CHECK_EVENT
-
[RFC,v6,09/92] kvm: introspection: add KVMI_GET_GUEST_INFO
-
[RFC,v6,10/92] kvm: introspection: add KVMI_CONTROL_VM_EVENTS
-
[RFC,v6,11/92] kvm: introspection: add vCPU related data
-
[RFC,v6,12/92] kvm: introspection: add a jobs list to every introspected vCPU
-
[RFC,v6,13/92] kvm: introspection: make the vCPU wait even when its jobs list is empty
-
[RFC,v6,14/92] kvm: introspection: handle introspection commands before returning to guest
-
[RFC,v6,15/92] kvm: introspection: handle vCPU related introspection commands
-
[RFC,v6,16/92] kvm: introspection: handle events and event replies
-
[RFC,v6,17/92] kvm: introspection: introduce event actions
-
[RFC,v6,18/92] kvm: introspection: add KVMI_EVENT_UNHOOK
-
[RFC,v6,19/92] kvm: introspection: add KVMI_EVENT_CREATE_VCPU
-
[RFC,v6,20/92] kvm: introspection: add KVMI_GET_VCPU_INFO
-
[RFC,v6,21/92] kvm: page track: add track_create_slot() callback
-
[RFC,v6,22/92] kvm: x86: provide all page tracking hooks with the guest virtual address
-
[RFC,v6,23/92] kvm: page track: add support for preread, prewrite and preexec
-
[RFC,v6,24/92] kvm: x86: wire in the preread/prewrite/preexec page trackers
-
[RFC,v6,25/92] kvm: x86: intercept the write access on sidt and other emulated instructions
-
[RFC,v6,26/92] kvm: x86: add kvm_mmu_nested_pagefault()
-
[RFC,v6,27/92] kvm: introspection: use page track
-
[RFC,v6,28/92] kvm: x86: consult the page tracking from kvm_mmu_get_page() and __direct_map()
-
[RFC,v6,29/92] kvm: introspection: add KVMI_CONTROL_EVENTS
-
[RFC,v6,30/92] kvm: x86: add kvm_spt_fault()
-
[RFC,v6,31/92] kvm: introspection: add KVMI_EVENT_PF
-
[RFC,v6,32/92] kvm: introspection: add KVMI_GET_PAGE_ACCESS
-
[RFC,v6,33/92] kvm: introspection: add KVMI_SET_PAGE_ACCESS
-
[RFC,v6,34/92] Documentation: Introduce EPT based Subpage Protection
-
[RFC,v6,35/92] KVM: VMX: Add control flags for SPP enabling
-
[RFC,v6,36/92] KVM: VMX: Implement functions for SPPT paging setup
-
[RFC,v6,37/92] KVM: VMX: Introduce SPP access bitmap and operation functions
-
[RFC,v6,38/92] KVM: VMX: Add init/set/get functions for SPP
-
[RFC,v6,39/92] KVM: VMX: Introduce SPP user-space IOCTLs
-
[RFC,v6,40/92] KVM: VMX: Handle SPP induced vmexit and page fault
-
[RFC,v6,41/92] KVM: MMU: Enable Lazy mode SPPT setup
-
[RFC,v6,42/92] KVM: MMU: Handle host memory remapping and reclaim
-
[RFC,v6,43/92] kvm: introspection: add KVMI_CONTROL_SPP
-
[RFC,v6,44/92] kvm: introspection: extend the internal database of tracked pages with write_bitmap …
-
[RFC,v6,45/92] kvm: introspection: add KVMI_GET_PAGE_WRITE_BITMAP
-
[RFC,v6,46/92] kvm: introspection: add KVMI_SET_PAGE_WRITE_BITMAP
-
[RFC,v6,47/92] kvm: introspection: add KVMI_READ_PHYSICAL and KVMI_WRITE_PHYSICAL
-
[RFC,v6,48/92] kvm: add kvm_vcpu_kick_and_wait()
-
[RFC,v6,49/92] kvm: introspection: add KVMI_PAUSE_VCPU and KVMI_EVENT_PAUSE_VCPU
-
[RFC,v6,50/92] kvm: introspection: add KVMI_GET_REGISTERS
-
[RFC,v6,51/92] kvm: introspection: add KVMI_SET_REGISTERS
-
[RFC,v6,52/92] kvm: introspection: add KVMI_GET_CPUID
-
[RFC,v6,53/92] kvm: introspection: add KVMI_INJECT_EXCEPTION + KVMI_EVENT_TRAP
-
[RFC,v6,54/92] kvm: introspection: add KVMI_CONTROL_CR and KVMI_EVENT_CR
-
[RFC,v6,55/92] kvm: introspection: add KVMI_CONTROL_MSR and KVMI_EVENT_MSR
-
[RFC,v6,56/92] kvm: x86: block any attempt to disable MSR interception if tracked by introspection
-
[RFC,v6,57/92] kvm: introspection: add KVMI_GET_XSAVE
-
[RFC,v6,58/92] kvm: introspection: add KVMI_GET_MTRR_TYPE
-
[RFC,v6,59/92] kvm: introspection: add KVMI_EVENT_XSETBV
-
[RFC,v6,60/92] kvm: x86: add kvm_arch_vcpu_set_guest_debug()
-
[RFC,v6,61/92] kvm: introspection: add KVMI_EVENT_BREAKPOINT
-
[RFC,v6,62/92] kvm: introspection: add KVMI_EVENT_HYPERCALL
-
[RFC,v6,63/92] kvm: introspection: add KVMI_EVENT_DESCRIPTOR
-
[RFC,v6,64/92] kvm: introspection: add single-stepping
-
[RFC,v6,65/92] kvm: introspection: add KVMI_EVENT_SINGLESTEP
-
[RFC,v6,66/92] kvm: introspection: add custom input when single-stepping a vCPU
-
[RFC,v6,67/92] kvm: introspection: use single stepping on unimplemented instructions
-
[RFC,v6,68/92] kvm: x86: emulate a guest page table walk on SPT violations due to A/D bit updates
-
[RFC,v6,69/92] kvm: x86: keep the page protected if tracked by the introspection tool
-
[RFC,v6,70/92] kvm: x86: filter out access rights only when tracked by the introspection tool
-
[RFC,v6,71/92] mm: add support for remote mapping
-
[RFC,v6,72/92] kvm: introspection: add memory map/unmap support on the guest side
-
[RFC,v6,73/92] kvm: introspection: use remote mapping
-
[RFC,v6,74/92] kvm: x86: do not unconditionally patch the hypercall instruction during emulation
-
[RFC,v6,75/92] kvm: x86: disable gpa_available optimization in emulator_read_write_onepage()
-
[RFC,v6,76/92] kvm: x86: disable EPT A/D bits if introspection is present
-
[RFC,v6,77/92] kvm: introspection: add trace functions
-
[RFC,v6,78/92] kvm: x86: add tracepoints for interrupt and exception injections
-
[RFC,v6,79/92] kvm: x86: emulate movsd xmm, m64
-
[RFC,v6,80/92] kvm: x86: emulate movss xmm, m32
-
[RFC,v6,81/92] kvm: x86: emulate movq xmm, m64
-
[RFC,v6,82/92] kvm: x86: emulate movq r, xmm
-
[RFC,v6,83/92] kvm: x86: emulate movd xmm, m32
-
[RFC,v6,84/92] kvm: x86: enable the half part of movss, movsd, movups
-
[RFC,v6,85/92] kvm: x86: emulate lfence
-
[RFC,v6,86/92] kvm: x86: emulate xorpd xmm2/m128, xmm1
-
[RFC,v6,87/92] kvm: x86: emulate xorps xmm/m128, xmm
-
[RFC,v6,88/92] kvm: x86: emulate fst/fstp m64fp
-
[RFC,v6,89/92] kvm: x86: make lock cmpxchg r, r/m atomic
-
[RFC,v6,90/92] kvm: x86: emulate lock cmpxchg8b atomically
-
[RFC,v6,91/92] kvm: x86: emulate lock cmpxchg16b m128
-
[RFC,v6,92/92] kvm: x86: fallback to the single-step on multipage CMPXCHG emulation
|