Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 19 Sep 2009 00:13:13 +0900 (JST)
From:      Hideki EIRAKU <hdk_2@yahoo.co.jp>
To:        pieter@thedarkside.nl
Cc:        freebsd-security@freebsd.org
Subject:   Re: Protecting against kernel NULL-pointer derefs
Message-ID:  <20090919.001313.110616099.hdk_2@yahoo.co.jp>
In-Reply-To: <4AAF4A64.3080906@thedarkside.nl>
References:  <4AAF4A64.3080906@thedarkside.nl>

next in thread | previous in thread | raw e-mail | index | archive | help
From: Pieter de Boer <pieter@thedarkside.nl>
Subject: Protecting against kernel NULL-pointer derefs
Date: Tue, 15 Sep 2009 10:03:48 +0200

> - Are there unwanted side-effects of raising VM_MIN_ADDRESS?

Mapping at address 0x0 is needed by some softwares using vm86 mode.
For example, emulators/doscmd uses vm86 mode to emulate an old DOS
environment. In this case, the address 0x0 - 0x3ff is used for an
interrupt vector of emulated DOS world. If VM_MIN_ADDRESS is not zero,
doscmd doesn't work. vm86 mode is in 32bit i386 architecture only, not
in amd64 or other architectures.

-- 
Hideki EIRAKU
--------------------------------------
Thanks 10 years!  Yahoo! Shopping and Yahoo! Auctions
http://pr.mail.yahoo.co.jp/ec10years/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090919.001313.110616099.hdk_2>