On Tue, Jan 26, 2016 at 2:09 AM, Paolo Bonzini <pbonzini@xxxxxxxxxx> wrote: > > > On 25/01/2016 19:31, poma wrote: >> On 23.01.2016 22:05, Paolo Bonzini wrote: >>> >>> >>> On 23/01/2016 16:07, poma wrote: >>>> "KVM: SVM: enable nested svm by default" >>>> https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/arch/x86/kvm?id=4b6e4dc >>>> "Nested SVM is (in my experience) stable enough to be enabled by default. So omit the requirement to pass a module parameter." >>>> >>>> I tried to get an explanation of the eventual -default- change here: >>>> https://bugzilla.redhat.com/show_bug.cgi?id=1298244 >>>> >>>> but "... I am *thinking* of changing it ..." ain't explanation, man. >>>> >>>> I've tested "Nested SVM" myself and it works surprisingly well, >>>> therefore what is the -actual- reason to switch it off by default? >>> >>> Neither nested VMX nor nested SVM have ever been audited for security; >>> they could have bugs that let a malicious guest escape L0. In fact I >>> would be surprised if they don't. :( >>> >>> Paolo >>> >> >> >> "In nested virtualization, we have three levels: The host (KVM), which we call >> L0, the guest hypervisor, which we call L1, and its nested guest, which we >> call L2." >> https://www.kernel.org/doc/Documentation/virtual/kvm/nested-vmx.txt >> >> So as long as you don't nestle proprietary crap, no problemos. > > Kind of. Suppose you are a cloud provider, and you think offering > nested virtualization would be cool. Now, a customer (who of course > controls the kernel running in your L1 VM) uses a vulnerability in KVM > to get out of his VM and attack the host. Enorme problema. > > Paolo Hi, Paolo, Even if cloud providers don't use nested virtualization, as long as there is "a vulnerability in KVM", it is still possible "to get out of his VM and attack the host". You mentioned that "Neither nested VMX nor nested SVM have ever been audited for security", so have this been done for non-nested virtualization? -Jidong > -- > To unsubscribe from this list: send the line "unsubscribe kvm" in > the body of a message to majordomo@xxxxxxxxxxxxxxx > More majordomo info at http://vger.kernel.org/majordomo-info.html -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html