|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] Xen missing prompt log when exec-sp=off
> From: Jin Nan Wang <jnwang@xxxxxxxx>
> Sent: Monday, December 16, 2019 1:48 PM
>
> Fix a issue when user disable ETP exec-sp, xen missed a prompt
> log in dmesg.
>
> Signed-off-by: James Wang <jnwang@xxxxxxxx>
> ---
> xen/arch/x86/hvm/vmx/vmx.c | 4 +++-
> 1 file changed, 3 insertions(+), 1 deletion(-)
>
> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
> index 7970ba93e1..9c1f0f645d 100644
> --- a/xen/arch/x86/hvm/vmx/vmx.c
> +++ b/xen/arch/x86/hvm/vmx/vmx.c
> @@ -2499,7 +2499,9 @@ const struct hvm_function_table * __init
> start_vmx(void)
> {
> /* Default to non-executable superpages on vulnerable hardware.
> */
> opt_ept_exec_sp = !cpu_has_bug_pschange_mc;
> -
> + }
no parenthesis then. Just move the comment before the earlier condition
check
> + if (opt_ept_exec_sp == false)
> + {
> if ( cpu_has_bug_pschange_mc )
> printk("VMX: Disabling executable EPT superpages due to CVE-
> 2018-12207\n");
> }
Can we do it another way? Always throw out a warning if the hardware
is vulnerable, plus its enabling status?
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |