[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v1 3/6] x86: Enable Supervisor Mode Execution Prevention (SMAP) for Xen
>>> On 16.04.14 at 11:10, <andrew.cooper3@xxxxxxxxxx> wrote: > On a broader note, how do implicit supervisor accesses interact with > SMAP when the usermode code is using alignment checking? Do we end up > with spurious SMAP violations for accesses to the GDT, LDT, IDT and TSS? None of these should be mapped with the U bit set at all levels. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |