WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Xen

xen-devel

[Top] [All Lists]

Re: [Xen-devel] dom0 vs non-dom0 differentiation inside Xen hypervisor

To: Peter Teoh <htmldeveloper@xxxxxxxxx>
Subject: Re: [Xen-devel] dom0 vs non-dom0 differentiation inside Xen hypervisor
From: Derek Murray <Derek.Murray@xxxxxxxxxxxx>
Date: 2007年9月13日 13:50:09 +0100
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: 2007年9月13日 05:50:36 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <46DA6248.4010101@xxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <46DA6248.4010101@xxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Hi Peter,
I think you'll find that all security-sensitive hypercalls contain a test of IS_PRIV(current->domain), which is #defined in xen/include/ xen/sched.h. Only privileged domains are able to carry out operations such as creating a domain, or accessing the memory of another domain. In practice, dom0 is the only privileged domain (and, hence, it is the only domain with its d->is_privileged bit set). However, it is conceivable that another domain could be granted privileges, and so we do not insist on the privileged domain being dom0.
Hope this helps.
Regards,
Derek Murray.
On 2 Sep 2007, at 08:12, Peter Teoh wrote:
In some parts of IA64 I can see that domain==dom0 checking is done, but in all x86 - I have yet to find a proper checking that the hypercalls comes from a dom0 domain instead of any other domain. Theoretically, this means that any domain (PV or HVM) can always modify its own kernel binary and then make a direct hypercall (via int 0x82 or SYSENTER) into the hypervisor, executing domain controller commands like create domain etc. Is this possible? Access control should be done from the hypervisor side, so any existing dom0 checking (CONFIG_XEN_PRIVILEGED_GUEST compilation option - done from the dom0 side) seems like useless, because another domU can always modify its own kernel binaries to achieve all the features what CONF_XEN_PRIVILEGED_GUEST restrict.
Am I right?
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
Previous by Date: Re: [Xen-devel] Re: Re: 3ware 9650 and Xen 3.1 , Robert Valentan
Next by Date: Re: [Xen-devel] Re: [RFC][Patch] Improvemet the responce of xend. , Akio Takebe
Previous by Thread: [Xen-devel] dom0 vs non-dom0 differentiation inside Xen hypervisor , Peter Teoh
Next by Thread: RE: [Xen-devel] Re: free_irq_vector on ia64 , Duan, Ronghui
Indexes: [Date] [Thread] [Top] [All Lists]

Copyright ©, Citrix Systems Inc. All rights reserved. Legal and Privacy
Citrix This site is hosted by Citrix

AltStyle によって変換されたページ (->オリジナル) /