Re: [PATCH] KVM: SVM: Workaround errata#1096 (insn_len maybe zero on SMAP violation)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 14/02/19 18:31, Jim Mattson wrote:
>> Theoretically we can use the single stepping with CR4.SMAP=0.
> 
> SEV allows the hypervisor to override the guest OS's CR4.SMAP
> setting?!? That seems counter-intuitive, given SEV's intended use.
> Doesn't this potentially give a ring-3 agent in the guest an avenue to
> privilege escalation through collusion with the hypervisor?

The first version does not protect any register content.  See this paper
for an example: https://arxiv.org/pdf/1612.01119.pdf

Paolo



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux