On Tue, May 28, 2024 at 10:07 AM Gregory Nutt <spudan...@gmail.com> wrote:
> On 5/26/2024 5:03 PM, Stuart Ianna wrote: > > With the riscv/litex port, we're able to access the TIME and TIMEH CSRs > in > > usermode. I would like to take advantage of this feature to replace the > > proxies for syscalls, such as timer_gettime with an equivalent > > implementation that avoids a context switch, where appropriate. > > I've been puzzling about this since this discussion started. Do you > mean that you can access the hardware interface from user-space? If so, > that would be a MASSIVE security hole and would make the port unusable > in any product that has even the most minimal security requirements. > > That would really be an error. It might be useful during debugging, but > would be catastrophic for most uses. Are you sure that you want to > exploit such a design flaw this way? I believe we should create an > issue for any such behavior to that people are aware and plug that > security hole as soon as possible. > > Or maybe I got that wrong. That's a security hole in the *hardware*, not in software, right? How can that be fixed (unless a new chip is made)?