[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-users] Using Xen as a jail for malicious code



> > That's what it was originally created for: containment of arbitrary
> > untrusted code submitted to a Xenoserver (Xenoservers project described:
> > http://www.cl.cam.ac.uk/Research/SRG/netos/xeno/).
>
> What about the rogue DMA problem mentioned in some of the papers?
> Has this been addressed?

Rogue DMAs was only a problem if domains have access to real devices - for 
unprivileged domains (the norm) which just have virtual devices it's never 
been an issue.

Conversely, domains which do have real device access must always be considered 
privileged, due to limitations of current hardware.  Usually that's just 
dom0, though, unless you've got a really advanced setup.

Cheers,
Mark

_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.