[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2] Xen missing prompt log when exec-sp=off
On 16.12.2019 09:27, Jin Nan Wang wrote: > Fix a issue when user disable ETP exec-sp, xen missed a prompt > log in dmesg. Why "missed" (and why "prompt")? I think the original intention was to log a message only when no command line option was given and the system would be vulnerable without the disabling. Nevertheless two style remarks as well: > --- a/xen/arch/x86/hvm/vmx/vmx.c > +++ b/xen/arch/x86/hvm/vmx/vmx.c > @@ -2495,14 +2495,14 @@ const struct hvm_function_table * __init > start_vmx(void) > { > bool cpu_has_bug_pschange_mc = has_if_pschange_mc(); > > + /* Default to non-executable superpages on vulnerable hardware. */ > if ( opt_ept_exec_sp == -1 ) > - { > - /* Default to non-executable superpages on vulnerable hardware. > */ > opt_ept_exec_sp = !cpu_has_bug_pschange_mc; > > - if ( cpu_has_bug_pschange_mc ) > - printk("VMX: Disabling executable EPT superpages due to > CVE-2018-12207\n"); > - } > + if (opt_ept_exec_sp) Missing blanks inside (). > + printk("VMX: Enable executable EPT superpages.\n"); No full stop here please. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |