From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1NCWvJ-0006ph-5N for qemu-devel@nongnu.org; Mon, 23 Nov 2009 06:17:37 -0500 Received: from exim by lists.gnu.org with spam-scanned (Exim 4.43) id 1NCWvE-0006oQ-5b for qemu-devel@nongnu.org; Mon, 23 Nov 2009 06:17:36 -0500 Received: from [199.232.76.173] (port=41022 helo=monty-python.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1NCWvD-0006oL-Qb for qemu-devel@nongnu.org; Mon, 23 Nov 2009 06:17:31 -0500 Received: from mx1.redhat.com ([209.132.183.28]:43350) by monty-python.gnu.org with esmtp (Exim 4.60) (envelope-from ) id 1NCWvD-0002Se-Dk for qemu-devel@nongnu.org; Mon, 23 Nov 2009 06:17:31 -0500 Date: Mon, 23 Nov 2009 13:17:26 +0200 From: Gleb Natapov Subject: Re: [Qemu-devel] Re: POST failure (loop) with isapc and seabios Message-ID: <20091123111726.GI2999@redhat.com> References: <20091120225113.GD24539@morn.localdomain> <20091122123503.GH3193@redhat.com> <20091122151052.GK3193@redhat.com> <217FD12D88EA4AC2B2A32D77E010B16C@FSCPC> <20091122153809.GL3193@redhat.com> <20091122174024.GD13491@morn.localdomain> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20091122174024.GD13491@morn.localdomain> List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Kevin O'Connor Cc: qemu-devel@nongnu.org, Sebastian Herbszt On Sun, Nov 22, 2009 at 12:40:24PM -0500, Kevin O'Connor wrote: > On Sun, Nov 22, 2009 at 05:38:09PM +0200, Gleb Natapov wrote: > > On Sun, Nov 22, 2009 at 04:31:24PM +0100, Sebastian Herbszt wrote: > > > // Write protect bios memory. > > > make_bios_readonly(); > > Hmmm. How is tpr patching works then? It relies on ability of a guest to > > write into BIOS memory region. Need to retest if it actually works I > > guess. > > The last time I looked, the TPR patching backend forced the "vapic" > pages to be writable (effectively overriding the bios decision to make > it readonly). > Don't see where it does this. But now I recall that KVM doesn't support ROM slots, so BIOS area is always writable under KVM. > > > Bad things could happen if someone modifies the BIOS because it's unprotected > > > (e.g. VM crash). > > I'm not sure why modification of the BIOS would cause a VM crash. If > this is true, then a malicious guest could unlock the ram and write to > it for the same effect. > > -Kevin -- Gleb.