|
|
|
|
|
|
|
|
|
|
xen-users
Re: [Xen-users] How to crash nics and hosts
On Friday 05 August 2005 11:10, Andreas Seuss wrote:
> >Maybe someone finds a way to abuse such behaviour? Does it pose a
> >possible security threat or can this issue just be disregarded?
Well, domains with hardware access can't really be made secure, and IIRC the
documentation also tells so..
Just imagine a busmaster capable PCI device:
the domU with access to it could instruct it to overwrite arbitrary memory
locations, even inside the hypervisor.
So unless the hypervisor traps ALL hardware accesses, and checks them for
validity (which would require xen to know everything about all hardware to be
used, ...) before executing, a malicious domain with hardware access can
always crash the system...
That approach would be rather slow (about the speed of completely emulated
hardware I'd suppose), so just exporting virtual devices from a driver domain
is way easier (and probably much faster) if you need protection from
malicious domUs
Maybe the hardware support for virtualization in the next generation CPUs will
provide a solution there...
/Ernst
_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users
|
|
|
|
|