On Thu, Jun 19, 2025 at 11:06 PM Marek Marczykowski-Górecki
<marma...@invisiblethingslab.com> wrote:
>
> On Thu, Jun 19, 2025 at 12:56:12PM -0700, Stefano Stabellini wrote:
> > On Thu, 19 Jun 2025, Marek Marczykowski-Górecki wrote:
> > > On Thu, Jun 19, 2025 at 03:16:51PM +0100, Ross Lagerwall wrote:
> > > > I think a section on PCI passthrough is also warranted. i.e. preventing 
> > > > misuse
> > > > of a device to exploit Secure Boot.
> > >
> > > While I agree it makes sense, I wonder if it's in scope for UEFI
> > > Secure Boot as defined by Microsoft? It may have implication for example
> > > on PCI passthrough to a PV domains.
> >
> > If we bring DomUs into the discussion, then I think we need to make a
> > distinction between predefined DomUs, which could have signatures
> > verified by Secure Boot (such as Dom0 and hyperlaunch/dom0less guests),
> > and other dynamically created DomUs which could be fetched from the
> > network and potentially started without signature verification or prior
> > knowledge.
>
> I think it's mostly not about what's running inside domU, but what such
> domU has access to. The obvious part is enforcing IOMMU configuration so
> that domU cannot use a PCI device as a proxy to modify hypervisor (or
> dom0) code. But there may be more subtleties like access to specific
> devices (HECI? SPI?).
> Anyway, lets figure out first _if_ we need to do something about this
> topic, and only then worry how.
>

As far as I know, Microsoft haven't specified requirements to this level
of detail. However, if userspace can break the Secure Boot principles
laid out above using a (spec compliant) PCI device to write memory, then
I don't see why it would be any different to a Secure Boot compromise
using the CPU to write memory. Linux prevents direct access to PCI
devices when lockdown mode is enabled, presumably to prevent these kinds
of attacks.

Ross

Reply via email to