[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v1 3/6] x86: Enable Supervisor Mode Execution Prevention (SMAP) for Xen
>>> On 15.04.14 at 16:09, <andrew.cooper3@xxxxxxxxxx> wrote: > And having just sent this email, I further realise that functions like > show_page_walk() need protection against SMAP otherwise we will take a > recursive fault when trying to dump the error information from the first > fault. I don't recall any of your other patches dealing with this. I don't follow: page table walks are done using map_domain_page(), which ought to not produce user mode accessible mappings. Or did you mean to say "may" instead of "will", and meant to do this just to be on the safe side? Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |