[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] [PATCH] Protect Xen against accessing NULL-pointer triggered by Xenoprof Hypercall in dom0


  • To: "Yang, Xiaowei" <xiaowei.yang@xxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • From: "Santos, Jose Renato G" <joserenato.santos@xxxxxx>
  • Date: Wed, 21 Jan 2009 16:33:24 +0000
  • Accept-language: en-US
  • Acceptlanguage: en-US
  • Cc:
  • Delivery-date: Wed, 21 Jan 2009 08:34:33 -0800
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: Acl7gKicM/iId9enQp6DKDQ8krftMgAZR+Cg
  • Thread-topic: [Xen-devel] [PATCH] Protect Xen against accessing NULL-pointer triggered by Xenoprof Hypercall in dom0

Xiaowei,

Could you please clarify what is the NULL pointer problem that you want to 
prevent with this patch?
Thanks

Renato 

> -----Original Message-----
> From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx 
> [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of 
> Yang, Xiaowei
> Sent: Tuesday, January 20, 2009 8:28 PM
> To: xen-devel@xxxxxxxxxxxxxxxxxxx
> Subject: [Xen-devel] [PATCH] Protect Xen against accessing 
> NULL-pointer triggered by Xenoprof Hypercall in dom0
> 
> Xenoprof Hypercall in dom0 could trigger Xen accessing 
> NULL-pointer and results in fatal page fault. The patch prevents it.
> 
> Signed-off-by: Xiaowei Yang <xiaowei.yang@xxxxxxxxx>
> 
> Thanks,
> Xiaowei
> 
> 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.