Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

providers/vmware: allow avoiding iopl permission errors #495

Merged
merged 3 commits into from
Oct 9, 2020

Conversation

lucab
Copy link
Contributor

@lucab lucab commented Oct 8, 2020

This introduces a fallback path for the backdoor-opening logic,
in order to allow Afterburn to keep going when changing
I/O access level is not allowed.
Privileged mode is in theory more reliable but kernel_lockdown(7)
may block it due to iopl() usage. Thus, we try that first and
fall back if kernel blocks it.

Ref: https://github.com/lucab/vmw_backdoor-rs/issues/6

lucab added 3 commits October 8, 2020 13:02
This introduces a fallback path for the backdoor-opening logic,
in order to allow consuming applications to keep going when changing
I/O access level is not allowed.
Privileged mode is in theory more reliable but `kernel_lockdown(7)`
may block it due to `iopl()` usage. Thus, we try that first and
fall back if kernel blocks it.
Copy link
Contributor

@arithx arithx left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code looks good to me. Looks like CI flaked.

@lucab lucab merged commit 2a313f3 into coreos:master Oct 9, 2020
@lucab lucab deleted the ups/vmware-backdoor-unprivileged branch October 9, 2020 07:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants