[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Vulnerabilities in Synchronous IPC Designs

From: Niels Möller
Subject: Re: Vulnerabilities in Synchronous IPC Designs
Date: 03 Jun 2003 11:56:03 +0200
User-agent: Gnus/5.09 (Gnus v5.9.0) Emacs/21.2

Espen Skoglund <address@hidden> writes:

> It is trivial to add a check in the IDL compiler (and generated code)
> for the length of a variable length buffer.  If the variable length
> buffer fits within 256 bytes (or 512 bytes on 64-bit architectures),
> the content can be transferred using message registers.  If this is
> your only concern, then you shouldn't worry.  (I was actually sort of
> suprised to learn that IDL4 didn't support this in the current
> implementation.)

Is there any documentation, besides the IDL4 source code, which
specifies how an rpc (as described by the idl input) is mapped to L4
ipc operations? I would really like to see a specification for that,
which should ideally make it straight forward to hand code a server
that communicates with a client that uses idl4-generated stubs, or
vice versa, and to write idl input that matches the kernel and sigma0

To me, such a specification is more important than the implementation
of it. Undocumented black-box protocols don't give me that warn and
fuzzy feeling...


reply via email to

[Prev in Thread] Current Thread [Next in Thread]