On Thu, Mar 12, 2015 at 4:56 PM, Ian Campbell <ian.campb...@citrix.com>
wrote:

> On Thu, 2015-03-12 at 16:44 +0100, Tamas K Lengyel wrote:
> >
> >
> > On Thu, Mar 12, 2015 at 4:40 PM, Julien Grall
> > <julien.gr...@linaro.org> wrote:
> >         Hi Ian,
> >
> >         On 12/03/15 15:27, Ian Campbell wrote:
> >         >> Currently, check_type_get_page emulate only the check for
> >         2). So you may
> >         >> end up to allow Xen writing in read-only mapping (from the
> >         Stage 1 POV).
> >         >> This was XSA-98.
> >         >
> >         > XSA-98 was purely about stage-2 permissions (e.g. read-only
> >         grants). The
> >         > fact that the resulting patch also checks stage-1
> >         permissions is not a
> >         > security property AFAICT.
> >
> >         XSA-98 was for both... Without checking stage-1 permission a
> >         userspace
> >         which can issue an hypercall may be able to write into
> >         read-only kernel
> >         space. Whoops.
> >
> >
> > Userspace is able to issue hypercall?
>
> Via ioctls on /proc/xen/privcmd, yes. It's how the toolstack talks to
> Xen...
>

Well, that is not the userspace issuing the hypercall, its a kernel module
issuing the hypercall on behalf of a process ;)

Tamas
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to