[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v1 3/6] x86: Enable Supervisor Mode Execution Prevention (SMAP) for Xen



>>> On 16.04.14 at 11:10, <andrew.cooper3@xxxxxxxxxx> wrote:
> On a broader note, how do implicit supervisor accesses interact with
> SMAP when the usermode code is using alignment checking?  Do we end up
> with spurious SMAP violations for accesses to the GDT, LDT, IDT and TSS?

None of these should be mapped with the U bit set at all levels.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.