Displaying 15 results from an estimated 15 matches for "introspector".
Did you mean:
introspection
2019 Oct 02
5
DANGER WILL ROBINSON, DANGER
On 02/10/19 19:04, Jerome Glisse wrote:
> On Wed, Oct 02, 2019 at 06:18:06PM +0200, Paolo Bonzini wrote:
>>>> If the mapping of the source VMA changes, mirroring can update the
>>>> target VMA via insert_pfn. But what ensures that KVM's MMU notifier
>>>> dismantles its own existing page tables (so that they can be recreated
>>>> with the new
2019 Oct 02
5
DANGER WILL ROBINSON, DANGER
On 02/10/19 19:04, Jerome Glisse wrote:
> On Wed, Oct 02, 2019 at 06:18:06PM +0200, Paolo Bonzini wrote:
>>>> If the mapping of the source VMA changes, mirroring can update the
>>>> target VMA via insert_pfn. But what ensures that KVM's MMU notifier
>>>> dismantles its own existing page tables (so that they can be recreated
>>>> with the new
2019 Oct 03
0
DANGER WILL ROBINSON, DANGER
...ot set it up on the anonymous vma but on the mmap of the
kvm device file, the resulting vma is under the control of the
kvm device file and is not an anonymous vma but a "device" special
vma.
So in summary, the source qemu process has anonymous vma (regular
libc malloc for instance). The introspector qemu process which
mirror the the source qemu use mmap on /dev/kvm (assuming you can
reuse the kvm device file for this otherwise you can introduce a
new kvm device file). The resulting mmap inside the introspector
qemu process is a vma which has vma->vm_file pointing to the kvm
device file and...
2004 Nov 28
1
[LLVMdev] attempt to make dummy drivers for llvm-gcc for f77, java and objc
...;}
int stmts_are_full_exprs_p (void){ return 0;}
int anon_aggr_type_p (tree a){ return 0;}
void prep_stmt (tree a){}
stmt_tree current_stmt_tree (void){ return 0;}
Hope this made your day just a little bit nicer,
mike
=====
James Michael DuPont
http://introspector.sourceforge.net/
2006 Mar 08
4
Creatulator: Before I go and make it myself, does this exist...
...ould just be reflected out by
the active record. I use PortGres exclusivly, and I know that there
are ways to ask the database things like, "what is the primary key"
"what relation does this foreign key belong to" etc...
So what I am about to go and write myself is a database introspector
that will look at a database and create all the Models for every table
for me, including all the set_primary_key, all the has_many
belong_tos, and many, if not all, of the validates_blah based on the
database constraints.
This is going to be quite an undertaking, so before I go and do it,
does any...
2019 Oct 04
0
DANGER WILL ROBINSON, DANGER
...al memory view" ioctl
above. KVM will then associate that KVMI socket with the newly created
file descriptor.
- use KVMI messages to that socket to map/unmap sections of memory
> Redirect (some) GFN->HVA translations into the new VMA based on a table
> of addresses required by the introspector process.
That would be tricky because there are multiple paths (gfn_to_page,
gfn_to_pfn, etc.).
There is some complication in this because the new device has to be
plumbed at multiple levels (KVM, QEMU, libvirt). But it seems like a
very easily separated piece of code (except for the KVMI socket...
2019 Aug 09
0
[RFC PATCH v6 55/92] kvm: introspection: add KVMI_CONTROL_MSR and KVMI_EVENT_MSR
...fied MSR is invalid
+* -KVM_EINVAL - padding is not zero
+* -KVM_EAGAIN - the selected vCPU can't be introspected yet
+
Events
======
@@ -1308,3 +1347,37 @@ register (see **KVMI_CONTROL_EVENTS**).
``kvmi_event``, the control register number, the old value and the new value
are sent to the introspector. The *CONTINUE* action will set the ``new_val``.
+7. KVMI_EVENT_MSR
+-----------------
+
+:Architectures: x86
+:Versions: >= 1
+:Actions: CONTINUE, CRASH
+:Parameters:
+
+::
+
+ struct kvmi_event;
+ struct kvmi_event_msr {
+ __u32 msr;
+ __u32 padding;
+ __u64 old_value;
+ __u64 new_value;...
2019 Aug 09
0
[RFC PATCH v6 02/92] kvm: introspection: add basic ioctls (hook/unhook)
...-------
+
+Although this falls out of the scope of the introspection subsystem, below
+is a proposal of a handshake that can be used by implementors.
+
+Based on the system administration policies, the management tool
+(eg. libvirt) starts device managers (eg. QEMU) with some extra arguments:
+what introspector could monitor/control that specific guest (and how to
+connect to) and what introspection commands/events are allowed.
+
+The device manager will connect to the introspection tool and wait for a
+cryptographic hash of a cookie that should be known by both peers. If the
+hash is correct (the destina...
2004 Apr 07
5
[LLVMdev] Automating Diagnostic Instrumentation
Dear List,
I have some questions about some passes for LLVM that I'm thinking about
but first I need to give a little background ...
One of the things I do in my "day job" (large IT system performance
analysis) is to figure out where to place diagnostic instrumentation
within an application. The instrumentation I'm talking about here is the
kind that is inserted into
2019 Aug 09
0
[RFC PATCH v6 27/92] kvm: introspection: use page track
...m->mmu_lock so it's not allowed to be
+ * called under kvmi_put(). It can reach a deadlock if called
+ * from kvm_mmu_load -> kvmi_tracked_gfn -> kvmi_put.
+ */
+ kvmi_clear_mem_access(kvm);
+
/*
* At this moment the socket is shut down, no more commands will come
* from the introspector, and the only way into the introspection is
@@ -351,6 +640,8 @@ int kvmi_hook(struct kvm *kvm, const struct kvm_introspection *qemu)
goto err_alloc;
}
+ kvm_page_track_register_notifier(kvm, &ikvm->kptn_node);
+
/*
* Make sure all the KVM/KVMI structures are linked and no pointer...
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place
2019 Aug 09
117
[RFC PATCH v6 00/92] VM introspection
The KVM introspection subsystem provides a facility for applications running
on the host or in a separate VM, to control the execution of other VM-s
(pause, resume, shutdown), query the state of the vCPUs (GPRs, MSRs etc.),
alter the page access bits in the shadow page tables (only for the hardware
backed ones, eg. Intel's EPT) and receive notifications when events of
interest have taken place
2019 Aug 09
6
[RFC PATCH v6 71/92] mm: add support for remote mapping
...rocess to map into its address space a page from
another process. The previous page (if it exists) is dropped. There is
no corresponding pair of system calls as this API is meant to be used
by the kernel itself only.
The targeted user is the upcoming KVM VM introspection subsystem (KVMI),
where an introspector running in its own VM will map pages from the
introspected guest in order to eliminate round trips to the host kernel
(read/write guest pages).
The flow is as follows: the introspector identifies a guest physical
address where some information of interest is located. It creates a one
page anonymou...
2020 Feb 07
78
[RFC PATCH v7 00/78] VM introspection
The KVM introspection subsystem provides a facility for applications
running on the host or in a separate VM, to control the execution of
other VMs (pause, resume, shutdown), query the state of the vCPUs (GPRs,
MSRs etc.), alter the page access bits in the shadow page tables (only
for the hardware backed ones, eg. Intel's EPT) and receive notifications
when events of interest have taken place
2020 Jul 21
87
[PATCH v9 00/84] VM introspection
The KVM introspection subsystem provides a facility for applications
running on the host or in a separate VM, to control the execution of
other VMs (pause, resume, shutdown), query the state of the vCPUs (GPRs,
MSRs etc.), alter the page access bits in the shadow page tables (only
for the hardware backed ones, eg. Intel's EPT) and receive notifications
when events of interest have taken place