Le 12/06/2025 à 12:08, Jan Beulich a écrit :
> On 12.06.2025 01:58, Andrew Cooper wrote:
>> +
>> +Lockdown Mode
>> +^^^^^^^^^^^^^
>> +
>> +A mode which causes the enforcement of the properties necessary to conform 
>> to
>> +the Secure Boot specification.  Lockdown Mode is forced active when Secure
>> +Boot is active in the platform, but may be activated independently too for
>> +development purposes with the ``lockdown`` command line option.
>> +
>> +TODO
>> +^^^^
>> +
>> + * Command Line
>> + * Livepatching
>> + * Kexec
>> + * Userspace hypercalls
>
> What about Dom0 being able to access almost(?) all memory, including all MMIO?
> In this context, isn't iommu=dom0-strict a requirement for SB (while that's
> still not the default mode of operation for PV Dom0, despite me keeping to
> suggest that we ought to change that default)?
>

Unless I missed something, the kernel is not a part of the TCB in this
Secure Boot model. But at some point, we definitely want to reduce the
TCB to just Xen, and put a more limited trust on the control domains.

Yet, the current plan of hardening the privcmd device is going to be
very hard for sure.

dom0-iommu=strict is a good mitigations in case untrusted parties of the
dom0 get direct access to a devices. However, as it is now, it implies a
IOTLB flush for each grant mapping done, which severely impede PV
performance (PV-IOMMU patches can help solving this performance problem
though).

Teddy


Teddy Astie | Vates XCP-ng Developer

XCP-ng & Xen Orchestra - Vates solutions

web: https://vates.tech



Reply via email to