On Tue, May 28, 2024 at 10:07 AM Gregory Nutt <spudan...@gmail.com> wrote:

> On 5/26/2024 5:03 PM, Stuart Ianna wrote:
> > With the riscv/litex port, we're able to access the TIME and TIMEH CSRs
> in
> > usermode. I would like to take advantage of this feature to replace the
> > proxies for syscalls, such as timer_gettime with an equivalent
> > implementation that avoids a context switch, where appropriate.
>
> I've been puzzling about this since this discussion started.  Do you
> mean that you can access the hardware interface from user-space?  If so,
> that would be a MASSIVE security hole and would make the port unusable
> in any product that has even the most minimal security requirements.
>
> That would really be an error.  It might be useful during debugging, but
> would be catastrophic for most uses.  Are you sure that you want to
> exploit such a design flaw this way?  I believe we should create an
> issue for any such behavior to that people are aware and plug that
> security hole as soon as possible.
>
> Or maybe I got that wrong.



That's a security hole in the *hardware*, not in software, right? How can
that be fixed (unless a new chip is made)?

Reply via email to