WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-ia64-devel

[Xen-ia64-devel] [PATCH]: allow hypercalls only from kernels.

To: xen-ia64-devel@xxxxxxxxxxxxxxxxxxx, "Magenheimer, Dan (HP Labs Fort Collins)" <dan.magenheimer@xxxxxx>, Alex Williamson <alex.williamson@xxxxxx>
Subject: [Xen-ia64-devel] [PATCH]: allow hypercalls only from kernels.
From: Tristan Gingold <Tristan.Gingold@xxxxxxxx>
Date: Mon, 20 Mar 2006 14:28:00 +0100
Delivery-date: Mon, 20 Mar 2006 13:25:09 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-ia64-devel-request@lists.xensource.com?subject=help>
List-id: Discussion of the ia64 port of Xen <xen-ia64-devel.lists.xensource.com>
List-post: <mailto:xen-ia64-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-ia64-devel>, <mailto:xen-ia64-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-ia64-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: KMail/1.5
Hi,

this patch complete the previous one.
Hypercalls are only allowed from kernels.
I have added an 'unsafe_hypercall' boolean command line option to enable the 
two debugging hypercalls.  This option is disabled by default, as it may be 
used to write in the kernel area.

Tested by boot+shutdown of dom0+domU (option off).
Tested by boot of dom0 + postat (option on).

Tristan.

Attachment: xen-security2.diffs
Description: Text Data

_______________________________________________
Xen-ia64-devel mailing list
Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ia64-devel
<Prev in Thread] Current Thread [Next in Thread>