Re: [PATCH] KVM: VMX: Reintroduce I/O port 0x80 bypass

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 03/20/18 14:29, Paolo Bonzini wrote:
> On 20/03/2018 21:43, hpa@xxxxxxxxx wrote:
>> What is the security issue?  Port 0x80 used for other purposes on
>> real hardware?  In that case, the host kernel would need to know
>> about it, and could disable this hack, no?
> 
> Yes, there are DMI-based quirks.
> 
>> (Such a machine would have a hard time running Linux, too.  That
>> being said, I don't think it would be a bad idea to induce something
>> like X86_FEATURE_NOIODELAY which would patch out those writes; KVM
>> guests could set it.)
> 
> We already do that in KVM guests through pvops.  This flag could still
> be useful if the DMI-based quirks were to set it, but honestly I think
> that Tim has either a bad driver or some kind of misconfiguration.

I guess the security issue is that if it is permitted to *read* from
port 0x80 then you can read the last value written, at least on some
systems (it aliases an unused DMA page register which are RW storage at
least on some systems.)  This would allow the guest to snoop on activity
in the host or other guests depending on what is going on.

So yes... not really possible without separate read and write bitmaps :(

	-hpa



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux