LWN: Comments on "KVM for Android" https://lwn.net/Articles/836693/ This is a special feed containing comments posted to the individual LWN article titled "KVM for Android". en-us Fri, 31 Oct 2025 04:07:00 +0000 Fri, 31 Oct 2025 04:07:00 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net KVM for Android https://lwn.net/Articles/875548/ https://lwn.net/Articles/875548/ mountainlion0523 <div class="FormattedComment"> What distinguishes Protected KVM with lowvisor in nVHE?<br> before VHE, there was already a lowvisor which does handle hypervisor requests and it runs on EL2, it seems very similiar with Protected KVM<br> </div> Wed, 10 Nov 2021 02:53:20 +0000 KVM for Android https://lwn.net/Articles/844139/ https://lwn.net/Articles/844139/ jserra <div class="FormattedComment"> How does this fit within ARM Trusted Frmware(ATF) architecture. Will ATF no longer be used? <br> I&#x27;m assuming that ATF&#x27;s BL3 that implements the SMC interface will bot be running at EL3. In practice this means Trustzone will not be used at all?<br> Will your EL3 code also implement PSCI?<br> What about Android&#x27;s Keymaster TA that runs in the TEE? Also moved to a KVM guest?<br> </div> Wed, 27 Jan 2021 14:26:27 +0000 KVM for Android https://lwn.net/Articles/837858/ https://lwn.net/Articles/837858/ rmayr <div class="FormattedComment"> Yes, that is one of the main drives - TrustZone (where most of this code lives today) is highly privileged and opaque, and TEE implementations certainly have had their share of vulnerabilities. Sandboxing that code in VMs helps the whole system and therefore users.<br> </div> Fri, 20 Nov 2020 07:49:24 +0000 KVM for Android https://lwn.net/Articles/837334/ https://lwn.net/Articles/837334/ wildea01 <div class="FormattedComment"> Thanks for the excellent write-up, Jake!<br> <p> One thing I feel that I should clarify is my use of the term &quot;VMM&quot;, which I used to refer to the _userspace_ component of KVM on the host (e.g. QEMU, crosvm or kvmtool). This always lives in userspace, regardless of VHE/nVHE. The primary difference between VHE and nVHE is that the host _kernel_ runs at EL2 or EL1 respectively. With nVHE, EL2 contains some small &quot;world-switch&quot; code installed by the kernel and it is this layer that we are working to extend for Protected KVM.<br> <p> Will<br> </div> Mon, 16 Nov 2020 11:09:49 +0000 KVM for Android https://lwn.net/Articles/837131/ https://lwn.net/Articles/837131/ sbaugh <div class="FormattedComment"> Protecting the Android system and the user could be done by running these DRM blobs under normal KVM. The &quot;protected KVM&quot; project isn&#x27;t necessary to achieve that - regular KVM would work fine.<br> <p> &quot;Protected KVM&quot; is only necessary if you don&#x27;t want the Android kernel and user to have a higher privilege level than the DRM blobs - which is a requirement specific to DRM and anti-user things like it.<br> </div> Fri, 13 Nov 2020 15:45:19 +0000 KVM for Android https://lwn.net/Articles/837079/ https://lwn.net/Articles/837079/ mzyngier <div class="FormattedComment"> That&#x27;s indeed the goal. We can&#x27;t really get rid of it (apparently, people really want 4K N*****x on a 15cm screen), but we can move that code to a place where it won&#x27;t risk harming the rest of the system if it goes mad.<br> <p> At least, that&#x27;s the plan.<br> </div> Fri, 13 Nov 2020 13:40:34 +0000 KVM for Android https://lwn.net/Articles/837077/ https://lwn.net/Articles/837077/ jezuch <div class="FormattedComment"> That&#x27;s how I read it too. Currently it&#x27;s forced upon the user and runs in a super-privileged context with no oversight at all. Sandboxing this code can only benefit the user. (Though I agree that removing it would be best.)<br> </div> Fri, 13 Nov 2020 12:12:08 +0000 KVM for Android https://lwn.net/Articles/837021/ https://lwn.net/Articles/837021/ smurf <div class="FormattedComment"> <font class="QuotedText">&gt; digital rights management</font><br> <p> Well … actually I think the defectivebydesign.org people have gotten that right when they renamed the acronym to Digital Restrictions Management.<br> <p> There&#x27;s no rights being &quot;managed&quot; here. Only withheld.<br> </div> Fri, 13 Nov 2020 07:48:21 +0000 KVM for Android https://lwn.net/Articles/837020/ https://lwn.net/Articles/837020/ adam820 <div class="FormattedComment"> I suppose that depends on how you read the context of that whole sentence. It sounded to me like the goal was to protect the Android system (and thus, the user) from whatever this third-party code is doing, since there&#x27;s no control over it. Not necessarily to enable that code (it&#x27;s enabled regardless).<br> </div> Thu, 12 Nov 2020 15:32:53 +0000 KVM for Android https://lwn.net/Articles/837017/ https://lwn.net/Articles/837017/ sbaugh <div class="FormattedComment"> <font class="QuotedText">&gt;third-party code for digital rights management (DRM), various opaque binary blobs, cryptographic code, and so on</font><br> <p> So in the end, the &quot;security&quot; gains of the &quot;protected KVM&quot; project are securing the device against the user, not actual improved security for the user. That&#x27;s pretty disappointing. When people talk about shrinking the TCB, and how that improves security, I generally take them at their word, not as this kind of masked anti-user effort...<br> </div> Thu, 12 Nov 2020 15:19:53 +0000 KVM for Android https://lwn.net/Articles/836950/ https://lwn.net/Articles/836950/ pabs <div class="FormattedComment"> Would this work allow for running the distros in VMs on Android devices?<br> </div> Thu, 12 Nov 2020 07:38:45 +0000