[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] x86: constrain MFN range Dom0 may access
On 20/01/16 15:38, Jan Beulich wrote: > ... to that covered by the physical address width supported by the > processor. This implicitly avoids Dom0 (accidentally or due to some > kind of abuse) passing out of range addresses to a guest, which in > turn eliminates this only possibility for PV guests to create PTEs > with one or more reserved bits set. > > Note that this is not a security issue due to XSA-77. > > Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |