Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 25 Aug 2021 09:50:04 -0400
From:      Ernie Luzar <luzar722@gmail.com>
To:        bugzilla-noreply@freebsd.org
Cc:        jail@FreeBSD.org
Subject:   Re: [Bug 251046] bhyve PCI passthrough does not work inside jail
Message-ID:  <61264A8C.2080301@gmail.com>
In-Reply-To: <bug-251046-29815-3pgqnYxqPI@https.bugs.freebsd.org/bugzilla/>
References:  <bug-251046-29815@https.bugs.freebsd.org/bugzilla/> <bug-251046-29815-3pgqnYxqPI@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help
bugzilla-noreply@freebsd.org wrote:
> https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=251046
> 
> --- Comment #15 from Anatoli <me@anatoli.ws> ---
> Mark, All,
> 
>> --- Comment #3 from Mark Johnston <markj@FreeBSD.org> ---
>> PRIV_IO access is not required only by /dev/io, it is also required for
>> sysarch(I386_SET_IOPERM), which is otherwise available to jailed processes. So
>> the patch definitely should not be committed.  A better solution would be to
>> extend pci(4) so that bhyve can use it to do everything required for PCI
>> passthrough.  Even then I'm not sure why it's useful to jail the bhyve process
>> - what does it buy you?
> 
> In light of the recently patched VM-escape vulnerability in bhyve
> (FreeBSD-SA-21:13.bhyve fixing the CVE-2021-29631), I'd like to highlight the
> benefits of running bhyve under a non-root user and inside a jail by default.
> 
> If it were the case, this vulnerability, instead of a complete host takeover
> would just have a DoS impact on the malicious VM, which is perfectly fine IMO.
> 
> That's why it's extremely important to make bhyve work correctly under all
> situations (including PPT) inside jail so we could make it run inside jail by
> default.
> 
> 
>> --- Comment #8 from Mark Johnston <markj@FreeBSD.org> ---
>> I am very skeptical that jailing bhyve with PCI passthrough enabled provides
>> any meaningful security.  /dev/pci allows a jailed root to access all PCI(e)
>> devices in the system. Jails can be a useful deployment mechanism though, so I
>> think we should better support their integration with bhyve.
> 
> With respect to this, isn't it possible to restrict the bhyve process (maybe
> self-restricting via Capsicum) to just the masked PCI addresses or to the PCI
> addresses specified via the args so to limit the impact of a bhyve compromise
> to
> just the intended device(s)?
> 
> Or, as you already proposed, to extend pci(4) so that bhyve can use it to do
> everything required for PPT?
> 
> Regards,
> Anatoli
> 

jail is not a vm.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?61264A8C.2080301>