WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] [PATCH] Paravirt framebuffer backend tools [2/5]

To: Markus Armbruster <armbru@xxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH] Paravirt framebuffer backend tools [2/5]
From: Anthony Liguori <aliguori@xxxxxxxxxxxxx>
Date: Wed, 04 Oct 2006 09:57:56 -0500
Cc: aliguori <aliguori@xxxxxxxxxxxxxxx>, Jeremy Katz <katzj@xxxxxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxx>, sos22@xxxxxxxxxxxxx
Delivery-date: Thu, 05 Oct 2006 01:49:31 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <87y7rwyy6q.fsf@xxxxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <20060904090150.GC4812@xxxxxxxxx> <87y7s168k2.fsf@xxxxxxxxxxxxxxxxx> <20061002090145.GA3576@xxxxxxxxx> <87y7rwyy6q.fsf@xxxxxxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Thunderbird 1.5.0.7 (X11/20060918)
Markus Armbruster wrote:
-- The backend still isn't proof against a malicious frontend.  This
   (might) mean that root in an unprivileged domain can get root in
   dom0, which is a fairly major problem.  Fixing this should be
   fairly easy.

Yes, this needs to be done.

Sorry if I missed this previously, but how could a malicious frontend attack a backend? And where else in Xen are we safe from this? :-)

-- The setup protocol doesn't look much like the normal xenbus state
   machine.  There may be a good reason for this, but I haven't heard
   one yet.  I know the standard way is badly documented and
   non-trivial to understand from the existing implementations; sorry
   about that.

This was written before we even had the xenbus state machine.

+                       case SDL_MOUSEBUTTONDOWN:
+                       case SDL_MOUSEBUTTONUP:
+                               xenfb_send_button(xenfb,
+                                       event.type == SDL_MOUSEBUTTONDOWN,
+                                       3 - event.button.button);
Why 3 - button?

Anthony speedcoding?  %-}

I never expected this code to see the light of day :-)

Seems like every UI toolkit uses a different ordering for mouse buttons. In this case, SDL stores them backwards :-)

                 What happens if someone has a four, five, six button
mouse?

Irritatingly, map_foreign_batch doesn't actually return success or
failure through its return value, but by setting the high bits on the
failed entry in the array you pass in.  If the array is mapped
readonly, or is shared with a remote domain, there's no way to detect
failure.

Sounds like a design flaw to me.

Wow.

Thanks again Markus for taking on this code! I hope it's not too painful :-)

Regards,

Anthony Liguori

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel