[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v7 00/10] x86: Enable Supervisor Mode Access Prevention (SMAP)



>>> On 08.05.14 at 10:15, <feng.wu@xxxxxxxxx> wrote:
> Feng Wu (10):
>   x86: define macros CPUINFO_features and CPUINFO_FEATURE_OFFSET
>   x86: move common_interrupt to entry.S
>   x86: merge stuff from asm-x86/x86_64/asm_defns.h to
>     asm-x86/asm_defns.h
>   x86: Add support for STAC/CLAC instructions
>   x86: Clear AC bit in RFLAGS to protect Xen itself by SMAP
>   x86: Temporary disable SMAP to legally access user pages in kernel
>     mode
>   VMX: Disable SMAP feature when guest is in non-paging mode
>   x86: Enable Supervisor Mode Access Prevention (SMAP) for Xen
>   x86/hvm: Add SMAP support to HVM guest
>   x86/tools: Expose SMAP to HVM guests

This list doesn't appear to match what you actually sent - all I see
are patches 5, 6, 8, and 9. Maybe the delivery of 4, 7, and 10 got
delayed, but it seems pretty clear you didn't resend 1-3 (as you
were asked), so why are these still listed here, and why is the
total count still 10 rather than 7 (or lower)?

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.