From: Paolo Bonzini <pbonzini@redhat.com>
To: poma <pomidorabelisima@gmail.com>
Cc: kvm-devel <kvm@vger.kernel.org>,
Cole Robinson <crobinso@redhat.com>,
"Richard W.M. Jones" <rjones@redhat.com>
Subject: Re: KVM SVM(AMD) nested - disabled by default?
Date: Tue, 26 Jan 2016 10:09:08 +0100 [thread overview]
Message-ID: <56A737B4.7030902@redhat.com> (raw)
In-Reply-To: <56A669F2.1050905@gmail.com>
On 25/01/2016 19:31, poma wrote:
> On 23.01.2016 22:05, Paolo Bonzini wrote:
>>
>>
>> On 23/01/2016 16:07, poma wrote:
>>> "KVM: SVM: enable nested svm by default"
>>> https://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/arch/x86/kvm?id=4b6e4dc
>>> "Nested SVM is (in my experience) stable enough to be enabled by default. So omit the requirement to pass a module parameter."
>>>
>>> I tried to get an explanation of the eventual -default- change here:
>>> https://bugzilla.redhat.com/show_bug.cgi?id=1298244
>>>
>>> but "... I am *thinking* of changing it ..." ain't explanation, man.
>>>
>>> I've tested "Nested SVM" myself and it works surprisingly well,
>>> therefore what is the -actual- reason to switch it off by default?
>>
>> Neither nested VMX nor nested SVM have ever been audited for security;
>> they could have bugs that let a malicious guest escape L0. In fact I
>> would be surprised if they don't. :(
>>
>> Paolo
>>
>
>
> "In nested virtualization, we have three levels: The host (KVM), which we call
> L0, the guest hypervisor, which we call L1, and its nested guest, which we
> call L2."
> https://www.kernel.org/doc/Documentation/virtual/kvm/nested-vmx.txt
>
> So as long as you don't nestle proprietary crap, no problemos.
Kind of. Suppose you are a cloud provider, and you think offering
nested virtualization would be cool. Now, a customer (who of course
controls the kernel running in your L1 VM) uses a vulnerability in KVM
to get out of his VM and attack the host. Enorme problema.
Paolo
next prev parent reply other threads:[~2016-01-26 9:09 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-01-23 15:07 KVM SVM(AMD) nested - disabled by default? poma
2016-01-23 21:05 ` Paolo Bonzini
2016-01-25 18:31 ` poma
2016-01-26 9:09 ` Paolo Bonzini [this message]
2016-01-26 11:00 ` poma
2016-01-26 21:17 ` Jidong Xiao
2016-01-26 21:28 ` Andrew Honig
2016-01-27 19:08 ` Jidong Xiao
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=56A737B4.7030902@redhat.com \
--to=pbonzini@redhat.com \
--cc=crobinso@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=pomidorabelisima@gmail.com \
--cc=rjones@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.