WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Xen

xen-devel

[Top] [All Lists]

RE: [Xen-devel] [PATCH] Protect Xen against accessing NULL-pointer trigg

To: "Yang, Xiaowei" <xiaowei.yang@xxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: RE: [Xen-devel] [PATCH] Protect Xen against accessing NULL-pointer triggered by Xenoprof Hypercall in dom0
From: "Santos, Jose Renato G" <joserenato.santos@xxxxxx>
Date: 2009年1月21日 16:33:24 +0000
Accept-language: en-US
Acceptlanguage: en-US
Cc:
Delivery-date: 2009年1月21日 08:34:33 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4976A436.7070704@xxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <4976A436.7070704@xxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: Acl7gKicM/iId9enQp6DKDQ8krftMgAZR+Cg
Thread-topic: [Xen-devel] [PATCH] Protect Xen against accessing NULL-pointer triggered by Xenoprof Hypercall in dom0
Xiaowei,
Could you please clarify what is the NULL pointer problem that you want to 
prevent with this patch?
Thanks
Renato 
> -----Original Message-----
> From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx 
> [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of 
> Yang, Xiaowei
> Sent: Tuesday, January 20, 2009 8:28 PM
> To: xen-devel@xxxxxxxxxxxxxxxxxxx
> Subject: [Xen-devel] [PATCH] Protect Xen against accessing 
> NULL-pointer triggered by Xenoprof Hypercall in dom0
>
> Xenoprof Hypercall in dom0 could trigger Xen accessing 
> NULL-pointer and results in fatal page fault. The patch prevents it.
>
> Signed-off-by: Xiaowei Yang <xiaowei.yang@xxxxxxxxx>
>
> Thanks,
> Xiaowei
>
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
Previous by Date: Re: [Xen-devel] [PATCH] x86: change IO-APIC ack method default forsingle IO-APIC systems , Keir Fraser
Next by Date: Re: [Xen-devel] [PATCH] x86: change IO-APIC ack method defaultforsingle IO-APIC systems , Jan Beulich
Previous by Thread: [Xen-devel] [PATCH] Protect Xen against accessing NULL-pointer triggered by Xenoprof Hypercall in dom0 , Yang, Xiaowei
Next by Thread: Re: [Xen-devel] [PATCH] Protect Xen against accessing NULL-pointer triggered by Xenoprof Hypercall in dom0 , Yang, Xiaowei
Indexes: [Date] [Thread] [Top] [All Lists]

Copyright ©, Citrix Systems Inc. All rights reserved. Legal and Privacy
Citrix This site is hosted by Citrix

AltStyle によって変換されたページ (->オリジナル) /