On Fri, Aug 14, 2015 at 9:57 AM, Martin Pohlack <mpohl...@amazon.com> wrote:
> On 14.08.2015 15:54, Jan Beulich wrote:
>>>>> On 14.08.15 at 14:59, <mpohl...@amazon.com> wrote:
>>> On 11.08.2015 16:12, Jan Beulich wrote:
>>>>>>> On 05.08.15 at 16:09, <mpohl...@amazon.de> wrote:
>>>>> Todo:
>>>>>   * Should be moved to sysctl to only allow Dom0 access
>>>>
>>>> Because of?
>>>
>>> The discussion in this thread:
>>>
>>> [Xen-devel] [RFC PATCH v3.1 2/2] xsplice: Add hook for build_id
>>>
>>> was:
>>> ----------------------------------------------------------------------
>>>>> Martin Pohlack:
>>>>> We should not expose the build_id to normal guests, but only to Dom0.
>>>>>
>>>>> A build_id uniquely identifies a specific build and I don't see how that
>>>>> information would be required from DomU.  It might actually help an
>>>>> attacker to build his return-oriented programming exploit against a
>>>>> specific build.
>>>>>
>>>>> The normal version numbers should be enough to know about capabilities
>>>>> and API.
>>>>
>>>> Andrew Cooper:
>>>>
>>>> It will need its own XSM hook, but need not be strictly limited to just
>>>> dom0.
>>> ----------------------------------------------------------------------
>>
>> So I'm confused - I asked "why Dom0 only" and then you point me to
>> Andrew saying it doesn't need to be Dom0 only?
>
> Sorry about that, my (not expressed) thinking was that we should
> restrict that to Dom0 for the XSM-disabled case.
>

That may make this more complex.

If we want to restrict it to this we may as well just stick this in sysctl
and have it be part of the xsplice ops.

Let me do that.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to