[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v1 3/6] x86: Enable Supervisor Mode Execution Prevention (SMAP) for Xen



>>> On 15.04.14 at 16:09, <andrew.cooper3@xxxxxxxxxx> wrote:
> And having just sent this email, I further realise that functions like
> show_page_walk() need protection against SMAP otherwise we will take a
> recursive fault when trying to dump the error information from the first
> fault.  I don't recall any of your other patches dealing with this.

I don't follow: page table walks are done using map_domain_page(),
which ought to not produce user mode accessible mappings. Or did
you mean to say "may" instead of "will", and meant to do this just to
be on the safe side?

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.