[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-ia64-devel] PATCH: cleanup of tlbflush



>From: Tristan Gingold [mailto:Tristan.Gingold@xxxxxxxx]
>Sent: 2006年5月11日 16:04
>>
>> I think the logic here is simple: domain assigns a virtual address to
>map
>> granted frame, and then later domain itself passes in same virtual
>address
>> to unmap granted frame. Xen simply helps domain upon its request.
>However we can't trust domU.  This model is too simple from a security
>point
>of view.

No one talks about trusting domU. I'm not digging into xen/x86's code 
to see how they prevent such malicious behavior by passing an incorrect 
virtual address at domain unmap request. Maybe the solution is there, 
maybe not. Anyway it's a common security issue, not specific to ia64. 
Please do things step by step. First to purge vhpt entry by gva based 
on current grant table arch, and then propose to xen-devel for common 
solution later if there.

Thanks,
Kevin

_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.