> What effect would this same hack have on the intended target if the
x86
> system being targeted was running as a guest under z/VM?  Wouldn't the
ill
> effects be reduced by the wall between virtual guests inherent with
z/VM?

It would be unlikely to be effective, IMHO, because it would need to be
two level; at the Intel emulation layer and at the z/VM layer, and in a
properly secured z/VM system with virtual machines running as class G
machines, it'd be really, really hard to compromise CP without doing
something very invasive via another vector (eg, compromising a
privileged id with access to real storage). 

There's also an awful lot of hardware isolation that isn't present in
the Intel space that you'd have to bypass to get into somebody else's
address space. If you were smart about using the multiple address space
capability of the Z processor (as CP does), then you'd also have
hardware protection working for you as well, and that would take some
doing to get around. Not impossible, but darn hard. 

-- db

Reply via email to