|  |  | 
  
    |  |  | 
 
  |   |  | 
  
    |  |  | 
  
    |  |  | 
  
    |   xen-users
Re: [Xen-users] How to crash nics and hosts 
| On Friday 05 August 2005 11:10, Andreas Seuss wrote:
> >Maybe someone finds a way to abuse such behaviour? Does it pose a
> >possible security threat or can this issue just be disregarded?
Well, domains with hardware access can't really be made secure, and IIRC the 
documentation also tells so..
Just imagine a busmaster capable PCI device:
the domU with access to it could instruct it to overwrite arbitrary memory 
locations, even inside the hypervisor.
So unless the hypervisor traps ALL hardware accesses, and checks them for 
validity (which would require xen to know everything about all hardware to be 
used, ...) before executing, a malicious domain with hardware access can 
always crash the system...
That approach would be rather slow (about the speed of completely emulated 
hardware I'd suppose), so just exporting virtual devices from a driver domain 
is way easier (and probably much faster) if you need protection from 
malicious domUs
Maybe the hardware support for virtualization in the next generation CPUs will 
provide a solution there...
/Ernst
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
 | 
 |  | 
  
    |  |  |