[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v6 08/10] x86: Enable Supervisor Mode Access Prevention (SMAP) for Xen
>>> On 08.05.14 at 08:25, <feng.wu@xxxxxxxxx> wrote: >> From: Tian, Kevin >> could you double-check whether S3 resume and CPU hotplug are covered >> well? >> > Kevin, thank you very much for point this out! > > I checked the following code path: > wakeup_start --> wakeup_32 --> wakeup_64 --> __ret_point --> > restore_rest_processor_state() > > I thought there was nothing special to do with SMAP here, but after careful > review, I think we should > set X86_EFLAGS_AC for MSR_SYSCALL_MASK in restore_rest_processor_state(), > which can > make AC bit cleared when entering kernel mode via SYSCALL after S3 resume. > However, I think this > change should be included in patch "Clear AC bit in RFLAGS to protect Xen > itself by SMAP", > in which, we did the same thing for MSR_SYSCALL_MASK in > subarch_percpu_traps_init(). Yes, that's indeed where it should be done. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |