public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: bugzilla-daemon@bugzilla.kernel.org
To: kvm@vger.kernel.org
Subject: [Bug 53871] New: nVMX: Can malicious L2 kill L1?
Date: Thu, 14 Feb 2013 15:22:18 +0000 (UTC)	[thread overview]
Message-ID: <bug-53871-28872@https.bugzilla.kernel.org/> (raw)

https://bugzilla.kernel.org/show_bug.cgi?id=53871

           Summary: nVMX: Can malicious L2 kill L1?
           Product: Virtualization
           Version: unspecified
          Platform: All
        OS/Version: Linux
              Tree: Mainline
            Status: NEW
          Severity: low
          Priority: P1
         Component: kvm
        AssignedTo: virtualization_kvm@kernel-bugs.osdl.org
        ReportedBy: nyh@math.technion.ac.il
        Regression: No


This is a thought-experiment bug - I haven't seen it happen in practice, so
maybe it's not a bug, but it's worth investigating.

There are, I think, places cases where KVM decides that the guest is buggy or
malicious so it aborts this guest. But because KVM is not aware that L1 and
several L2 (nested guests) are all pretending to be one guest (one vcpu) - this
might mean that a buggy or malicious L2 can kill an entire L1, not just this
L2.

A potential example of this problem is this (I'm not sure it's actually correct
- I just thought of this a long time ago and didn't recheck the details now):
In the original nested VMX submission, After L2 changed cr3, kvm_mmu_load() was
called to realize immediately that L2 did something bad and only it should be
aborted. But after a review, this test was removed, so the code now waits till
later, and when it later sees it can't kvm_mmu_load() I think it kills the
entire vcpu - L1 and all its L2s.

-- 
Configure bugmail: https://bugzilla.kernel.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching the assignee of the bug.

             reply	other threads:[~2013-02-14 15:22 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2013-02-14 15:22 bugzilla-daemon [this message]
2013-02-14 15:22 ` [Bug 53871] nVMX: Can malicious L2 kill L1? bugzilla-daemon
2015-03-17  3:53 ` bugzilla-daemon

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bug-53871-28872@https.bugzilla.kernel.org/ \
    --to=bugzilla-daemon@bugzilla.kernel.org \
    --cc=kvm@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox