[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 00/11] various tmem adjustments (mostly XSA-15 related)



> From: Jan Beulich [mailto:JBeulich@xxxxxxxx]
> Sent: Wednesday, September 05, 2012 6:33 AM
> To: xen-devel
> Cc: Dan Magenheimer; Zhenzhong Duan
> Subject: [PATCH 00/11] various tmem adjustments (mostly XSA-15 related)
> 
> 01: tmem: only allow tmem control operations from privileged domains
> 02: tmem: consistently make pool_id a uint32_t
> 03: tmem: check the pool_id is valid when destroying a tmem pool
> 04: tmem: check for a valid client ("domain") in the save subops
> 05: tmem: don't access guest memory without using the accessors intended for 
> this
> 06: tmem: detect arithmetic overflow in tmh_copy_{from,to}_client()
> 07: tmem: properly drop lock on error path in do_tmem_get()
> 08: tmem: properly drop lock on error path in do_tmem_op()
> 09: tmem: reduce severity of log messages
> 10: tmem: fixup 2010 cleanup patch that breaks tmem save/restore
> 11: tmem: cleanup

Thanks Jan and Ian for providing these patches!

Summary: All not already acked by me will be acked by me individually
shortly (with original cc list).  Some comments on PATCH 5/11 but still acked.

Keir or Jan (or whoever is applying the patches), a heads-up would
be appreciated to me and this cc list when this patchset is applied
to -staging or any other Xen tree.

Thanks,
Dan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.