[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [Xen-devel] [PATCH] Protect Xen against accessing NULL-pointer triggered by Xenoprof Hypercall in dom0


  • To: "Yang, Xiaowei" <xiaowei.yang@xxxxxxxxx>
  • From: "Santos, Jose Renato G" <joserenato.santos@xxxxxx>
  • Date: Thu, 22 Jan 2009 18:22:33 +0000
  • Accept-language: en-US
  • Acceptlanguage: en-US
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Thu, 22 Jan 2009 10:23:25 -0800
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>
  • Thread-index: Acl8K2yW1cFNoPoTQ0ez920F74rw4QAkqWsQ
  • Thread-topic: [Xen-devel] [PATCH] Protect Xen against accessing NULL-pointer triggered by Xenoprof Hypercall in dom0

Thanks Xiaowei
Yes, that makes sense.
I guess it is good to prevent dom0 misbehavior to crash the system.
The patch looks good to me

Thanks

Renato
 

> -----Original Message-----
> From: Yang, Xiaowei [mailto:xiaowei.yang@xxxxxxxxx] 
> Sent: Wednesday, January 21, 2009 4:50 PM
> To: Santos, Jose Renato G
> Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
> Subject: Re: [Xen-devel] [PATCH] Protect Xen against 
> accessing NULL-pointer triggered by Xenoprof Hypercall in dom0
> 
> Santos, Jose Renato G wrote:
> > Xiaowei,
> > 
> > Could you please clarify what is the NULL pointer problem 
> that you want to prevent with this patch?
> > Thanks
> > 
> Oh, let me put more details. For late coming CPUs that 
> Xenoprof doesn't support yet, pointers cpu_type and model 
> could be unassigned at init time and remains as NULL. However 
> almost all Xenoprof internal functions doesn't check it 
> before using. If the hyercall handler doesn't take care of 
> it, dom0 could exploit it (e.g. XENOPROF_reserve_counters) to 
> trigger Xen NULL-pointer access.
> 
> Thanks,
> Xiaowei
> 
> > Renato
> > 
> >> -----Original Message-----
> >> From: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
> >> [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxx] On Behalf Of Yang, 
> >> Xiaowei
> >> Sent: Tuesday, January 20, 2009 8:28 PM
> >> To: xen-devel@xxxxxxxxxxxxxxxxxxx
> >> Subject: [Xen-devel] [PATCH] Protect Xen against accessing 
> >> NULL-pointer triggered by Xenoprof Hypercall in dom0
> >>
> >> Xenoprof Hypercall in dom0 could trigger Xen accessing 
> NULL-pointer 
> >> and results in fatal page fault. The patch prevents it.
> >>
> >> Signed-off-by: Xiaowei Yang <xiaowei.yang@xxxxxxxxx>
> >>
> >> Thanks,
> >> Xiaowei
> >>
> >>
> 
> 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.