Hi,

On Sun, 2008-02-10 at 13:32 +0100, Bastian Blank wrote:
> You have to show evidence that the Hypervisor crashed if the exploit
> runs in a domU. dom0 is special and can always crash the hypervisor. A
> stacktrace is usable to do this.

I'm sorry but I cannot provide evidence because it would involve
crashing a production machine. Users of said machine are already annoyed
that it crashed the first time.

However, running the exploit does indeed cause the hypervisor to crash;
here's why:

The exploit works by altering the memory map (via vmsplice()) to get
access into kernel space. Since the memory map is altered in the domU,
it is no longer in sync with the global state. Each domU is aware of the
state of the other domU's in Xen (at least, this is what the
documentation tells me, and this would explain why you can't for example
mix NON-PAE and PAE kernels on x86). If one domU gets out of sync, it
could cause state corruption in the hypervisor.

As a result, Xen should check for this state corruption by maintaining a
secondary copy of the memory map and ensuring that it has not been
altered. If it has been altered, it should _probably_ kill the VM which
did it.

William

Attachment: signature.asc
Description: This is a digitally signed message part

Reply via email to