-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kernel_lockdown denies iopl calls #6
Comments
Thanks for forwarding this. |
Indeed the Go logic seems to be broken in the same way, coreos/ignition#1092. Without going to kernel modules, I think there is a vsock-based alternative: https://github.com/vmware/open-vm-tools/blob/f72e314e8b0df4e80c6b5f9b0c66ad2e9ce02e19/open-vm-tools/lib/rpcChannel/vsockChannel.c. However I still need to check details, hw-version compatibility and any other caveat for that transport. |
Based on web searches I'm not finding anyone saying that open-vm-tools fails in this scenario, so we likely need to do the same thing indeed. (It'd be nice to share code here between ignition and afterburn...dunno how easily we could expose a C library that go could link to that just does what ignition needs) |
https://github.com/lucab/vmw_backdoor-rs/pull/8 introduced a dual privileged/unprivileged path in |
See https://bugzilla.redhat.com/show_bug.cgi?id=1862851
specifically: https://bugzilla.redhat.com/show_bug.cgi?id=1862851#c7
Basically in Secure Boot mode
iopl()
isn't accessible to userspace. Is there a non-iopl()
mechanism to talk to the hypervisor? If not, we may need a kernel module to proxy this.The text was updated successfully, but these errors were encountered: