[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-ia64-devel] [PATCH] Fix vulnerability of copy_to_user in PAL emulation
On Wed, Dec 12, 2007 at 02:12:41PM +0900, Isaku Yamahata wrote: > On Wed, Dec 12, 2007 at 01:07:13PM +0900, Kouya Shimura wrote: > > Shouldn't we call vcpu_increment_iip(v); unconditionally? > If pal_emul() returns other than IA64_NO_FAULT, > guest will issue the same break instruction again with same argument > resulting in no forward progress. Isn't it what it expected in case of TLB miss injection ? Tristan. _______________________________________________ Xen-ia64-devel mailing list Xen-ia64-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-ia64-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |