[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Qemu-devel] [RFC] host and guest kernel trace merging
From: |
Paolo Bonzini |
Subject: |
Re: [Qemu-devel] [RFC] host and guest kernel trace merging |
Date: |
Mon, 7 Mar 2016 18:13:52 +0100 |
User-agent: |
Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0 |
On 07/03/2016 17:26, Steven Rostedt wrote:
> > > How's the connection set up. That is, how does it know the commands are
> > > coming from the host? And how does it know that the commands from the
> > > host is from a trusted source? If the host is compromised, is there
> > > anything keeping an intruder from controlling the guest?
> >
> > qemu-guest-agent uses a virtio channel, so only the host can be driving
> > that channel. But how can a guest know that it trusts the host? It
> > can't. A compromised host implicitly compromises all guests, and that's
> > always been the case. At least qemu-guest-agent doesn't make the window
> > any larger.
>
> I should have been a bit more clear about what I meant by "host is
> compromised". I should have asked, what about untrusted tasks on the
> host. Is the channel protected where only admin users can access it?
The other side of the channel is typically a socket or a pty, so it's
protected by file permissions, SELinux, and the like.
Paolo
Re: [Qemu-devel] [RFC] host and guest kernel trace merging, Peter Xu, 2016/03/24