QEMU for Xen secure by default Deprivileging the PC system emulator Ian Jackson <ian.jackson@eu.citrix.com> FOSDEM 2016 with assistance from Stefano Stabellini
guest guest Xen PV driver IDE driver Xen PV protocol mmio, dma, etc. qemu Emulated IDE controller Xen PV backend (usually), syscalls (usually) dom0 (usu.dom0) kernel Device driver kernel Device driver PV HVM
... ... ... ... ... http://xenbits.xen.org/xsa/ from Xen Security Team advisories page,
Xen on x86 modes, and device model bug implications Current status for users of upstream Xen and distros and future plans Status Device model Notes bugs mean PV Fully supported Safe (no DM) Only modified guests HVM qemu in dom0 Fully supported Vulnerable Current default as root HVM qemu stub DM Upstream but not Safe Ancient qemu qemu-xen-trad. in most distros. Build system problems HVM qemu stub DM In progress Safe Rump build system rump kernel Hard work! is mini distro Targeting HVM qemu dom0 No privilege esc. Defence in depth Xen 4.7 not as root Maybe dom0 DoS Hopefully, will be default
Xen on x86 modes, and device model bug implications Current status for users of upstream Xen and distros and future plans Status Device model Notes bugs mean PV Fully supported Safe (no DM) Only modified guests HVM qemu in dom0 Fully supported Vulnerable Current default as root HVM qemu stub DM Upstream but not Safe Ancient qemu qemu-xen-trad. in most distros. Build system problems HVM qemu stub DM In progress Safe Rump build system rump kernel Hard work! is mini distro Targeting HVM qemu dom0 No privilege esc. Defence in depth Xen 4.7 not as root Maybe dom0 DoS Hopefully, will be default
qemu device model process guest dom0 kernel guest "dma" domain mmio handling net, storage control ioport handling etc. access interrupts underlying Xen disk, network, etc.
Xen on x86 modes, and device model bug implications Current status for users of upstream Xen and distros and future plans Status Device model Notes bugs mean PV Fully supported Safe (no DM) Only modified guests HVM qemu in dom0 Fully supported Vulnerable Current default as root HVM qemu stub DM Upstream but not Safe Ancient qemu qemu-xen-trad. in most distros. Build system problems HVM qemu stub DM In progress Safe Rump build system rump kernel Hard work! is mini distro Targeting HVM qemu dom0 No privilege esc. Defence in depth Xen 4.7 not as root Maybe dom0 DoS Hopefully, will be default
Recommend
More recommend